Christoph Sorge

Affiliations:
  • Universität des Saarlandes, Germany


According to our database1, Christoph Sorge authored at least 54 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
I recognize you by your steps: Privacy impact of pedometer data.
Comput. Secur., 2023

2021
Recht und Technik - Datenschutz im Diskurs.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021

2020
Measuring privacy in smart metering anonymized data.
CoRR, 2020

On the Lack of Anonymity of Anonymized Smart Meter Data: An Empiric Study.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

2019
Informatik mit Recht.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

2017
A privacy-preserving reputation system with user rewards.
J. Netw. Comput. Appl., 2017

A Comparison of Payment Schemes for the IoT.
Proceedings of the Open Identity Summit 2017, 2017

sec-cs: Getting the Most out of Untrusted Cloud Storage.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Triviback: A Storage-Efficient Secure Backup System.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Recht und Technik.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017

Modelling Traffic Analysis in Home Automation Systems.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Privacy Challenges in the Quantified Self Movement - An EU Perspective.
Proc. Priv. Enhancing Technol., 2016

Efficient smart metering based on homomorphic encryption.
Comput. Commun., 2016

Deducing User Presence from Inter-Message Intervals in Home Automation Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Recht und Technik: Datenschutz im Diskurs.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

EncFS goes multi-user: Adding access control to an encrypted file system.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Save Our Passwords.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A reputation system supporting unlinkable, yet authorized expert ratings.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

2014
Analysis of the current state in website certificate validation.
Secur. Commun. Networks, 2014

Establishing user trust in automated teller machine integrity.
IET Inf. Secur., 2014

The legal classification of identity-based signatures.
Comput. Law Secur. Rev., 2014

Short paper: extrapolation and prediction of user behaviour from wireless home automation communication.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Privacy-preserving reputation management.
Proceedings of the Symposium on Applied Computing, 2014

Privacy-Preserving Digital Rights Management based on Attribute-based Encryption.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Reconstructing AES Key Schedules from Decayed Memory with FPGAs.
Proceedings of the 22nd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2014

Security and Privacy Challenges in On-The-Fly Computing.
Proceedings of the Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit in Zeiten von Big Data. Tagungsband/Proceedings zur 4. Konferenz STeP 2014, 2014

2013
WSANRep, WSAN Reputation-Based Selection in Open Environments.
Wirel. Pers. Commun., 2013

Privacy-enhanced architecture for smart metering.
Int. J. Inf. Sec., 2013

A privacy-friendly architecture for future cloud computing.
Int. J. Grid Util. Comput., 2013

Practical Aspects of the Bitcoin System.
CoRR, 2013

A storage-efficient cryptography-based access control solution for subversion.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

FPGA-accelerated key search for cold-boot attacks against AES.
Proceedings of the 2013 International Conference on Field-Programmable Technology, 2013

2012
Bitcoin: Eine erste Einordnung.
Datenschutz und Datensicherheit, 2012

Do not snoop my habits: preserving privacy in the smart grid.
IEEE Commun. Mag., 2012

A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture.
Proceedings of the SECRYPT 2012, 2012

Privacy-Preserving DRM for Cloud Computing.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Zum Stand der Technik in der WLAN-Sicherheit.
Computer und Recht, 2011

Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication.
Comput. Commun., 2011

2010
The Legal Ramifications of Call-Filtering Solutions.
IEEE Secur. Priv., 2010

2009
Initial observations on economics, pricing, and penetration of the internet of things market.
Comput. Commun. Rev., 2009

A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms.
Proceedings of IEEE International Conference on Communications, 2009

Privacy-enabled identity management in the Future Internet.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

2008
Selbstorganisierende Empfehlungssysteme im Internet: eine interdisziplinäre Betrachtung zwischen Technik und Recht.
PhD thesis, 2008

eIDs und Identitätsmanagement.
Datenschutz und Datensicherheit, 2008

Key-Substitution-Angriffe und das Signaturgesetz.
Datenschutz und Datensicherheit, 2008

2007
Datenschutz in P2P-basierten Systemen - Peer-to-Peer-Netze jenseits des Filesharing.
Datenschutz und Datensicherheit, 2007

A Chord-based Recommender System.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

2006
Distributed ascending proxy auction - A cryptographic approach.
Wirtschaftsinf., 2006

A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks.
Proceedings of the Trust Management, 4th International Conference, 2006

2005
Signaturen durch elektronische Agenten.
Inform. Spektrum, 2005

An asynchronous and secure ascending peer-to-peer auction.
Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, 2005

Conclusion of contracts by electronic agents.
Proceedings of the Tenth International Conference on Artificial Intelligence and Law, 2005


  Loading...