Items where Division is "Christoph Sorge (juris Professorship of Legal Informatics, RI)" and Year is 2012

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: H | M | P | S | V
Number of items: 8.

H

Hofbauer, Stefan and Beckers, Kristian and Quirchmayr, Gerald and Sorge, Christoph
(2012) A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example.
In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012.
Conference: TrustCom International Conference on Trust, Security and Privacy in Computing and Communications

M

Marmol, Felix Gomez and Sorge, Christoph and Ugus, Osman and Perez, Gregorio Martinez
(2012) Do not Snoop my Habits: Preserving Privacy in the Smart Grid.
IEEE Communications Magazine, Special Issue on Communication Protocols and Algorithms for the Smart Grid, 50 (5). pp. 166-172.

Möllers, Frederik
(2012) An Analysis of Traceability of Electronic Identification Documents.
Masters thesis, Universität Paderborn.

P

Petrlic, Ronald
(2012) Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.
In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12).

Petrlic, Ronald
(2012) Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.
In: Cyberspace Safety and Security.

Petrlic, Ronald and Sorge, Christoph
(2012) Privacy-Preserving DRM for Cloud Computing.
In: Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops.

S

Sorge, Christoph and Krohn-Grimberghe, Artus
(2012) Bitcoin: Eine erste Einordnung.
Datenschutz und Datensicherheit, 36 (7). pp. 479-484.

V

Vetter, Benjamin and Ugus, Osman and Westhoff, Dirk and Sorge, Christoph
(2012) Homomorphic Primitives for a Privacy-Friendly Smart Metering Architecture.
In: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2012).

This list was generated on Thu Mar 28 20:55:48 2024 CET.