Christoph Bösch

Orcid: 0000-0001-9312-8000

Affiliations:
  • University of Ulm, Institute of Distributed Systems, Germany


According to our database1, Christoph Bösch authored at least 28 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Navigating Privacy Patterns in the Era of Robotaxis.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey.
ACM Comput. Surv., 2023

2022
Mitigation lost in translation: leveraging threat information to improve privacy solution selection.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges.
Proc. Priv. Enhancing Technol., 2021

Are You Willing to Self-Disclose for Science? Effects of Privacy Awareness and Trust in Privacy on Self-Disclosure of Personal and Health Data in Online Scientific Studies - An Experimental Study.
Frontiers Big Data, 2021

Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

A Comparative Security Analysis of the German Federal Postal Voting Process.
Proceedings of the DG.O'21: The 22nd Annual International Conference on Digital Government Research, 2021

Confidential Token-Based License Management.
Proceedings of the AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, 2021

2019
Ride and Hide: A Study on the Privacy of Ride Hailing Services.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

A Privacy-Aware V-Model for Software Development.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Detecting Anomalous Driving Behavior using Neural Networks.
Proceedings of the 2019 IEEE Intelligent Vehicles Symposium, 2019

2018
uMine: a Blockchain based on Human Miners.
IACR Cryptol. ePrint Arch., 2018

An Efficient Privacy-Preserving Outsourced Geofencing Service Using Bloom Filter.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

iRide: A Privacy-Preserving Architecture for Self-Driving Cabs Service.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Secure Code Execution: A Generic PUF-Driven System Architecture.
Proceedings of the Information Security - 21st International Conference, 2018

Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Coloured Ring Confidential Transactions.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2016
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns.
Proc. Priv. Enhancing Technol., 2016

KopperCoin - A Distributed File Storage with Financial Incentives.
Proceedings of the Information Security Practice and Experience, 2016

2015
Cryptographically Enforced Search Pattern Hiding.
PhD thesis, 2015

2014
A Survey of Provably Secure Searchable Encryption.
ACM Comput. Surv., 2014

Distributed Searchable Symmetric Encryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

SOFIR: Securely outsourced Forensic image recognition.
Proceedings of the IEEE International Conference on Acoustics, 2014

2012
On the potential of PUF for pseudonym generation in vehicular networks.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Selective Document Retrieval from Encrypted Database.
Proceedings of the Information Security - 15th International Conference, 2012

2011
Conjunctive Wildcard Search over Encrypted Data.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

2008
Efficient Helper Data Key Extractor on FPGAs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008


  Loading...