default search action
Christoph Bösch
Person information
- affiliation: University of Ulm, Institute of Distributed Systems, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Ala'a Al-Momani, David Balenson, Zoltán Ádám Mann, Sebastian Pape, Jonathan Petit, Christoph Bösch:
Navigating Privacy Patterns in the Era of Robotaxis. EuroS&P Workshops 2024: 32-39 - 2023
- [j5]Michael P. Heinl, Simon Gölz, Christoph Bösch:
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey. ACM Comput. Surv. 55(8): 167:1-167:44 (2023) - 2022
- [c21]Ala'a Al-Momani, Christoph Bösch, Kim Wuyts, Laurens Sion, Wouter Joosen, Frank Kargl:
Mitigation lost in translation: leveraging threat information to improve privacy solution selection. SAC 2022: 1236-1247 - 2021
- [j4]Cornelia Herbert, Verena Marschin, Benjamin Erb, Dominik Meißner, Maria Aufheimer, Christoph Bösch:
Are You Willing to Self-Disclose for Science? Effects of Privacy Awareness and Trust in Privacy on Self-Disclosure of Personal and Health Data in Online Scientific Studies - An Experimental Study. Frontiers Big Data 4: 763196 (2021) - [j3]Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch:
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges. Proc. Priv. Enhancing Technol. 2021(4): 270-290 (2021) - [c20]Felix Engelmann, Jan Philip Speichert, Ralf God, Frank Kargl, Christoph Bösch:
Confidential Token-Based License Management. AMSec@CCS 2021: 39-48 - [c19]Michael P. Heinl, Simon Gölz, Christoph Bösch:
A Comparative Security Analysis of the German Federal Postal Voting Process. DG.O 2021: 198-207 - [c18]Ala'a Al-Momani, Kim Wuyts, Laurens Sion, Frank Kargl, Wouter Joosen, Benjamin Erb, Christoph Bösch:
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns. SAC 2021: 1217-1225 - [i4]Felix Engelmann, Jan Philip Speichert, Ralf God, Frank Kargl, Christoph Bösch:
Confidential Token-Based License Management. CoRR abs/2110.05118 (2021) - [i3]Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch:
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges. IACR Cryptol. ePrint Arch. 2021: 631 (2021)
2010 – 2019
- 2019
- [c17]Matthias Matousek, Mohamed El-Zohairy, Ala'a Al-Momani, Frank Kargl, Christoph Bösch:
Detecting Anomalous Driving Behavior using Neural Networks. IV 2019: 2229-2235 - [c16]Ala'a Al-Momani, Frank Kargl, Robert Karl Schmidt, Antonio Kung, Christoph Bösch:
A Privacy-Aware V-Model for Software Development. IEEE Symposium on Security and Privacy Workshops 2019: 100-104 - [c15]Ala'a Al-Momani, Frank Kargl, Christoph Bösch:
Ride and Hide: A Study on the Privacy of Ride Hailing Services. VNC 2019: 1-8 - 2018
- [c14]Felix Engelmann, Frank Kargl, Christoph Bösch:
Coloured Ring Confidential Transactions. DPM/CBT@ESORICS 2018: 188-196 - [c13]Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter:
uMine: A Blockchain Based on Human Miners. ICICS 2018: 20-38 - [c12]Henning Kopp, Frank Kargl, Christoph Bösch:
Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons. ICICS 2018: 459-477 - [c11]Stephan Kleber, Florian Unterstein, Matthias Hiller, Frank Slomka, Matthias Matousek, Frank Kargl, Christoph Bösch:
Secure Code Execution: A Generic PUF-Driven System Architecture. ISC 2018: 25-46 - [c10]Ala'a Al-Momani, Frank Kargl, Robert Karl Schmidt, Christoph Bösch:
iRide: A Privacy-Preserving Architecture for Self-Driving Cabs Service. VNC 2018: 1-8 - [c9]Christoph Bösch:
An Efficient Privacy-Preserving Outsourced Geofencing Service Using Bloom Filter. VNC 2018: 1-8 - [i2]Felix Engelmann, Frank Kargl, Christoph Bösch:
Coloured Ring Confidential Transactions. CoRR abs/1807.10554 (2018) - [i1]Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter:
uMine: a Blockchain based on Human Miners. IACR Cryptol. ePrint Arch. 2018: 722 (2018) - 2017
- [c8]Henning Kopp, David Mödinger, Franz J. Hauck, Frank Kargl, Christoph Bösch:
Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives. EuroS&P Workshops 2017: 14-22 - 2016
- [j2]Christoph Bösch, Benjamin Erb, Frank Kargl, Henning Kopp, Stefan Pfattheicher:
Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. Proc. Priv. Enhancing Technol. 2016(4): 237-254 (2016) - [c7]Henning Kopp, Christoph Bösch, Frank Kargl:
KopperCoin - A Distributed File Storage with Financial Incentives. ISPEC 2016: 79-93 - 2015
- [b1]Christoph Bösch:
Cryptographically Enforced Search Pattern Hiding. University of Twente, Enschede, Netherlands, 2015 - 2014
- [j1]Christoph Bösch, Pieter H. Hartel, Willem Jonker, Andreas Peter:
A Survey of Provably Secure Searchable Encryption. ACM Comput. Surv. 47(2): 18:1-18:51 (2014) - [c6]Christoph Bösch, Andreas Peter, Pieter H. Hartel, Willem Jonker:
SOFIR: Securely outsourced Forensic image recognition. ICASSP 2014: 2694-2698 - [c5]Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, Willem Jonker:
Distributed Searchable Symmetric Encryption. PST 2014: 330-337 - 2012
- [c4]Christoph Bösch, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Selective Document Retrieval from Encrypted Database. ISC 2012: 224-241 - [c3]Jonathan Petit, Christoph Bösch, Michael Feiri, Frank Kargl:
On the potential of PUF for pseudonym generation in vehicular networks. VNC 2012: 94-100 - 2011
- [c2]Christoph Bösch, Richard Brinkman, Pieter H. Hartel, Willem Jonker:
Conjunctive Wildcard Search over Encrypted Data. Secure Data Management 2011: 114-127
2000 – 2009
- 2008
- [c1]Christoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls:
Efficient Helper Data Key Extractor on FPGAs. CHES 2008: 181-197
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint