default search action
Christoph Sorge
Person information
- affiliation: Universität des Saarlandes, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]Rüdiger Grimm, Gerrit Hornung, Christoph Sorge, Indra Spiecker genannt Döhmann:
Recht und Technik - Datenschutz im Diskurs: Vorwort zu den Workshopbeiträgen. INFORMATIK 2024: 133-134 - 2023
- [j21]Aljoscha Dietrich, Kurunandan Jain, Georg Gutjahr, Bianca Steffes, Christoph Sorge:
I recognize you by your steps: Privacy impact of pedometer data. Comput. Secur. 124: 102994 (2023) - [c33]Rüdiger Grimm, Gerrit Hornung, Christoph Sorge, Indra Spiecker genannt Döhmann:
Recht und Technik - Datenschutz im Diskurs. GI-Jahrestagung 2023: 675-676 - 2022
- [c32]Rüdiger Grimm, Gerrit Hornung, Christoph Sorge, Indra Spiecker genannt Döhmann:
Recht und Technik - Datenschutz im Diskurs. GI-Jahrestagung 2022: 519-520 - [e1]Enrico Francesconi, Georg Borges, Christoph Sorge:
Legal Knowledge and Information Systems - JURIX 2022: The Thirty-fifth Annual Conference, Saarbrücken, Germany, 14-16 December 2022. Frontiers in Artificial Intelligence and Applications 362, IOS Press 2022, ISBN 978-1-64368-364-5 [contents] - 2021
- [c31]Rüdiger Grimm, Gerrit Hornung, Christoph Sorge, Indra Spiecker genannt Döhmann:
Recht und Technik - Datenschutz im Diskurs. GI-Jahrestagung 2021: 963-964 - 2020
- [c30]Rüdiger Grimm, Gerrit Hornung, Christoph Sorge, Indra Spiecker genannt Döhmann:
Recht und Technik - Datenschutz im Diskurs. GI-Jahrestagung 2020: 813-814 - [c29]Aljoscha Dietrich, Dominik Leibenger, Christoph Sorge:
On the Lack of Anonymity of Anonymized Smart Meter Data: An Empiric Study. LCN 2020: 405-408 - [i4]Santi Martínez, Francesc Sebé, Christoph Sorge:
Measuring privacy in smart metering anonymized data. CoRR abs/2002.04863 (2020)
2010 – 2019
- 2019
- [c28]Rüdiger Grimm, Gerrit Hornung, Christoph Sorge, Indra Spiecker genannt Döhmann, Arno Wacker:
Informatik mit Recht. GI-Jahrestagung 2019: 293-294 - 2017
- [j20]Núria Busom Figueres, Ronald Petrlic, Francesc Sebé, Christoph Sorge, Magda Valls:
A privacy-preserving reputation system with user rewards. J. Netw. Comput. Appl. 80: 58-66 (2017) - [c27]Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge:
Modelling Traffic Analysis in Home Automation Systems. CANS 2017: 526-536 - [c26]Christoph Sorge, Indra Spiecker genannt Döhmann, Rüdiger Grimm:
Recht und Technik. GI-Jahrestagung 2017: 1021-1023 - [c25]Dominik Leibenger, Christoph Sorge:
Triviback: A Storage-Efficient Secure Backup System. LCN 2017: 435-443 - [c24]Dominik Leibenger, Christoph Sorge:
sec-cs: Getting the Most out of Untrusted Cloud Storage. LCN 2017: 623-631 - [c23]Jens-Matthias Bohli, Aljoscha Dietrich, Ronald Petrlic, Christoph Sorge:
A Comparison of Payment Schemes for the IoT. Open Identity Summit 2017: 181-186 - 2016
- [j19]Núria Busom Figueres, Ronald Petrlic, Francesc Sebé, Christoph Sorge, Magda Valls:
Efficient smart metering based on homomorphic encryption. Comput. Commun. 82: 95-101 (2016) - [j18]Dominik Leibenger, Frederik Möllers, Anna Petrlic, Ronald Petrlic, Christoph Sorge:
Privacy Challenges in the Quantified Self Movement - An EU Perspective. Proc. Priv. Enhancing Technol. 2016(4): 315-334 (2016) - [c22]Dominik Leibenger, Jonas Fortmann, Christoph Sorge:
EncFS goes multi-user: Adding access control to an encrypted file system. CNS 2016: 525-533 - [c21]Rüdiger Grimm, Christoph Sorge, Indra Spiecker genannt Döhmann:
Recht und Technik: Datenschutz im Diskurs. GI-Jahrestagung 2016: 411-412 - [c20]Michael Lass, Dominik Leibenger, Christoph Sorge:
Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. LCN 2016: 1-9 - [c19]Frederik Möllers, Christoph Sorge:
Deducing User Presence from Inter-Message Intervals in Home Automation Systems. SEC 2016: 369-383 - [i3]Dominik Leibenger, Christoph Sorge:
sec-cs: Getting the Most out of Untrusted Cloud Storage. CoRR abs/1606.03368 (2016) - 2015
- [c18]Andreas Kokoschka, Ronald Petrlic, Christoph Sorge:
A reputation system supporting unlinkable, yet authorized expert ratings. SAC 2015: 2320-2327 - [c17]Martin Boonk, Ronald Petrlic, Christoph Sorge:
Save Our Passwords. TrustCom/BigDataSE/ISPA (1) 2015: 797-800 - 2014
- [j17]Christoph Sorge:
The legal classification of identity-based signatures. Comput. Law Secur. Rev. 30(2): 126-136 (2014) - [j16]Ronald Petrlic, Christoph Sorge:
Establishing user trust in automated teller machine integrity. IET Inf. Secur. 8(2): 132-139 (2014) - [j15]Nils Gruschka, Luigi Lo Iacono, Christoph Sorge:
Analysis of the current state in website certificate validation. Secur. Commun. Networks 7(5): 865-877 (2014) - [c16]Ronald Petrlic, Alexander Jungmann, Marie Christin Platenius, Wilhelm Schäfer, Christoph Sorge:
Security and Privacy Challenges in On-The-Fly Computing. STeP 2014: 131-142 - [c15]Heinrich Riebler, Tobias Kenter, Christian Plessl, Christoph Sorge:
Reconstructing AES Key Schedules from Decayed Memory with FPGAs. FCCM 2014: 222-229 - [c14]Ronald Petrlic, Christoph Sorge:
Privacy-Preserving Digital Rights Management based on Attribute-based Encryption. NTMS 2014: 1-5 - [c13]Ronald Petrlic, Sascha Lutters, Christoph Sorge:
Privacy-preserving reputation management. SAC 2014: 1712-1718 - [c12]Frederik Möllers, Sebastian Seitz, Andreas Hellmann, Christoph Sorge:
Short paper: extrapolation and prediction of user behaviour from wireless home automation communication. WISEC 2014: 195-200 - 2013
- [j14]Ronald Petrlic, Stephan Sekula, Christoph Sorge:
A privacy-friendly architecture for future cloud computing. Int. J. Grid Util. Comput. 4(4): 265-277 (2013) - [j13]Félix Gómez Mármol, Christoph Sorge, Ronald Petrlic, Osman Ugus, Dirk Westhoff, Gregorio Martínez Pérez:
Privacy-enhanced architecture for smart metering. Int. J. Inf. Sec. 12(2): 67-82 (2013) - [j12]Félix Gómez Mármol, Christoph Sorge, Osman Ugus, Gregorio Martínez Pérez:
WSANRep, WSAN Reputation-Based Selection in Open Environments. Wirel. Pers. Commun. 68(3): 921-937 (2013) - [c11]Heinrich Riebler, Tobias Kenter, Christoph Sorge, Christian Plessl:
FPGA-accelerated key search for cold-boot attacks against AES. FPT 2013: 386-389 - [c10]Dominik Leibenger, Christoph Sorge:
A storage-efficient cryptography-based access control solution for subversion. SACMAT 2013: 201-212 - [i2]Artus Krohn-Grimberghe, Christoph Sorge:
Practical Aspects of the Bitcoin System. CoRR abs/1308.6760 (2013) - [i1]Christoph Sorge:
The Legal Classification of Identity-Based Signatures. IACR Cryptol. ePrint Arch. 2013: 271 (2013) - 2012
- [j11]Félix Gómez Mármol, Christoph Sorge, Osman Ugus, Gregorio Martínez Pérez:
Do not snoop my habits: preserving privacy in the smart grid. IEEE Commun. Mag. 50(5): 166-172 (2012) - [j10]Christoph Sorge, Artus Krohn-Grimberghe:
Bitcoin: Eine erste Einordnung. Datenschutz und Datensicherheit 36(7): 479-484 (2012) - [c9]Ronald Petrlic, Christoph Sorge:
Privacy-Preserving DRM for Cloud Computing. AINA Workshops 2012: 1286-1291 - [c8]Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge:
Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture. SECRYPT 2012: 102-112 - [c7]Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge:
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example. TrustCom 2012: 992-997 - 2011
- [j9]Lars Völker, Marcel Noe, Oliver P. Waldhorst, Christoph Werle, Christoph Sorge:
Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication. Comput. Commun. 34(3): 457-467 (2011) - [j8]Christoph Sorge:
Zum Stand der Technik in der WLAN-Sicherheit. Computer und Recht 27(4): 273-276 (2011) - 2010
- [j7]Christoph Sorge, Saverio Niccolini, Jan Seedorf:
The Legal Ramifications of Call-Filtering Solutions. IEEE Secur. Priv. 8(2): 45-50 (2010)
2000 – 2009
- 2009
- [j6]Jens-Matthias Bohli, Christoph Sorge, Dirk Westhoff:
Initial observations on economics, pricing, and penetration of the internet of things market. Comput. Commun. Rev. 39(2): 50-55 (2009) - [c6]Christoph Sorge, Joao Girão, Amardeo Sarma:
Privacy-enabled identity management in the Future Internet. Future Internet Assembly 2009: 57-66 - [c5]Christoph Sorge, Jan Seedorf:
A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms. ICC 2009: 1-6 - 2008
- [b1]Christoph Sorge:
Selbstorganisierende Empfehlungssysteme im Internet: eine interdisziplinäre Betrachtung zwischen Technik und Recht. Karlsruhe Institute of Technology, Germany, 2008, ISBN 978-3-86644-233-7, pp. 1-245 - [j5]Christoph Sorge, Dirk Westhoff:
eIDs und Identitätsmanagement. Datenschutz und Datensicherheit 32(5): 337-341 (2008) - [j4]Jens-Matthias Bohli, Christoph Sorge:
Key-Substitution-Angriffe und das Signaturgesetz. Datenschutz und Datensicherheit 32(6): 388-392 (2008) - 2007
- [j3]Christoph Sorge:
Datenschutz in P2P-basierten Systemen - Peer-to-Peer-Netze jenseits des Filesharing. Datenschutz und Datensicherheit 31(2): 102-106 (2007) - [c4]Christoph Sorge:
A Chord-based Recommender System. LCN 2007: 157-164 - 2006
- [j2]Daniel Rolli, Michael Conrad, Dirk Neumann, Christoph Sorge:
Distributed ascending proxy auction - A cryptographic approach. Wirtschaftsinf. 48(1): 7-15 (2006) - [c3]Christoph Sorge, Martina Zitterbart:
A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks. iTrust 2006: 367-381 - 2005
- [j1]Martin Bergfelder, Tanja Nitschke, Christoph Sorge:
Signaturen durch elektronische Agenten. Inform. Spektrum 28(3): 210-219 (2005) - [c2]Christoph Sorge:
Conclusion of contracts by electronic agents. ICAIL 2005: 210-214 - [c1]Daniel Rolli, Michael Conrad, Dirk Neumann, Christoph Sorge:
An asynchronous and secure ascending peer-to-peer auction. P2PECON@SIGCOMM 2005: 105-110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint