Christoph Egger

Scopus Author ID: 57193312783



Organisation


Lehrstuhl für Informatik 13 (Angewandte Kryptographie)
Lehrstuhl für Informatik 8 (Theoretische Informatik)


Project member


(PeRsOnal MedIcal SafE):
PROMISE: Development of the underlying cryptographic algorithms and of the cloud application
Prof. Dr. Dominique Schröder
(01/07/2017 - 31/10/2019)


Publications (Download BibTeX)


Deuber, D., Egger, C., Fech, K., Malavolta, G., Schröder, D., Thyagarajan, S.A.K.,... Durand, C. (2019). My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data. Proceedings on Privacy Enhancing Technologies, 2019(1), 108-132. https://dx.doi.org/10.2478/popets-2019-0007
Lai, R.W.F., Egger, C., Reinert, M., Chow, S.S., Maffei, M., & Schröder, D. (2018). Simple Password-Hardened Encryption Services. In USENIX Association (Eds.), 27th USENIX Security Symposium (USENIX Security 18). Baltimore, MD, US: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Lai, R.W.F., Egger, C., Schröder, D., & Chow, S.S. (2017). Phoenix: Rebirth of a Cryptographic Password-Hardening Service. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 899--916). Vancouver, BC, CA: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Egger, C. (2016). An implementation of global caching for the alternation-free coalgebraic μ-calculus (Master thesis).
Hausmann, D., Schröder, L., & Egger, C. (2016). Global Caching for the Alternation-free Coalgebraic mu-calculus. In Proceedings of the 27th International Conference on Concurrency Theory, CONCUR 2016 (pp. 34:1-34:15). Québec City, Canada: Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
Hausmann, D., Schröder, L., & Egger, C. (2016). Global Caching for the Alternation-free mu-Calculus. In Josée Desharnais, Radha Jagadeesan (Eds.), 27th International Conference on Concurrency Theory, CONCUR 2016, August 23-26, 2016, Québec City, Canada (pp. 34:1--34:15). Québec City, CA: Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik.
Egger, C. (2013). Analysing and attacking the I2P Network Database (Bachelor thesis).
Egger, C., Schlumberger, J., Kruegel, C., & Vigna, G. (2013). Practical attacks against the I2P network. (pp. 432-451). Rodney Bay.
Tartler, R., Lohmann, D., Dietrich, C., Egger, C., & Sincero, J. (2012). Configuration coverage in the analysis of large-scale system software. Operating Systems Review, 45(3), 10-14. https://dx.doi.org/10.1145/2094091.2094095

Last updated on 2019-22-01 at 17:51