default search action
Christoph Thiel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j22]Arno Fiedler, Christoph Thiel, Christian Thiel:
Verlässliche Personenidentifizierung mittels Techniken der Künstlichen Intelligenz. Datenschutz und Datensicherheit 45(7): 462-466 (2021) - 2020
- [j21]Christoph Thiel, Christian Thiel:
Distributed Ledger Technologie (DLT) im Kontext europäischer Vertrauensdienste. Datenschutz und Datensicherheit 44(4): 250-253 (2020)
2010 – 2019
- 2018
- [j20]Arno Fiedler, Christian Thiel, Christoph Thiel:
Umsetzung technischer Anforderungen der DSGVO mittels eIDAS-VO-konformer Vertrauensdienste. Datenschutz und Datensicherheit 42(4): 236-240 (2018) - [j19]Arno Fiedler, Christoph Thiel:
Chancen europäischer Standards für die Zertifizierung? Datenschutz und Datensicherheit 42(7): 434-436 (2018) - 2017
- [j18]Christoph Thiel, Henrik Cordes, Lorenzo Fabbri, Hélène Eloise Aschmann, Vanessa Baier, Ines Smit, Francis Atkinson, Lars Mathias Blank, Lars Kuepfer:
A Comparative Analysis of Drug-Induced Hepatotoxicity in Clinically Relevant Situations. PLoS Comput. Biol. 13(2) (2017) - [c13]Grit Behrens, Johannes Weicht, Klaus Schlender, Florian Fehring, Rouven Dreimann, Michael Meese, Frank Hamelmann, Christoph Thiel, Thorsten Försterling, Marc Wübbenhorst:
Smart Monitoring System of Air Quality and Wall Humidity Accompanying an Energy Efficient Renovation Process of Apartment Buildings. EnviroInfo 2017: 181-189 - 2016
- [j17]Arno Fiedler, Christian Thiel, Christoph Thiel:
Organisationsübergreifendes Sicherheits- und Servicemanagement mittels eIDAS-konformer Vertrauensdienste. Datenschutz und Datensicherheit 40(10): 675-679 (2016) - 2015
- [j16]Christian Thiel, Christoph Thiel:
Hare and Tortoise. Datenschutz und Datensicherheit 39(10): 663-667 (2015) - [j15]Arno Fiedler, Christoph Thiel:
Nutzenpotenziale europäischer Vertrauensdienste für verlässliche Produktionsprozesse. Datenschutz und Datensicherheit 39(10): 671-675 (2015) - [c12]Christian Thiel, Christoph Thiel:
Industry 4.0 - Challenges in Anti-Counterfeiting. ISSE 2015: 111-120 - 2014
- [j14]Arno Fiedler, Christoph Thiel:
Certificate Transparency. Datenschutz und Datensicherheit 38(10): 679-683 (2014) - [c11]Arno Fiedler, Christoph Thiel:
The need of European White Knights for the TLS/SSL Certificate System. ISSE 2014: 170-174 - [c10]Christian Thiel, Christoph Thiel:
Enforcing Data Privacy in the Age of Google Glass. ISSE 2014: 220-229 - 2013
- [j13]Christoph Thiel, Arno Fiedler:
Der grenzenlose digitale Binnenmarkt. Datenschutz und Datensicherheit 37(1): 14-19 (2013) - 2012
- [c9]Markus Vogel, Christoph Thiel, Hartmut Fricke:
Assessing the air traffic control safety impact of airline pilot induced latencies. ATACCS 2012: 38-45 - 2011
- [j12]Arno Fiedler, Christoph Thiel:
Signaturstandardisierung: Selbstzweck oder Notwendigkeit? - Die Langzeitvalidierung von PDF-Dokumenten als gutes Beispiel. Datenschutz und Datensicherheit 35(1): 36-40 (2011) - 2010
- [j11]Christoph Thiel:
Business Continuity Management für KMU. Datenschutz und Datensicherheit 34(6): 404-407 (2010)
2000 – 2009
- 2008
- [j10]Markus Dahm, Christoph Thiel:
Gibt es die barrierefreie Brandmauer? i-com 7(3): 14-24 (2008) - [c8]Alberto Susini, Christian Hürzeler, Andreas Schönenberger, Alexandre Massot, Hartmut Fricke, Norbert Gronak, Christoph Thiel, Daniel Fiedler:
Assessment of Aircraft Accident Probability on Industrial Facilities by Means of GIS Risk-Register, the Examples of Geneva, "Geneva Risk". EnviroInfo 2008: 466-475 - [c7]Markus Dahm, Christoph Thiel:
Usability und/oder Security. UP 2008: 101-105 - 2004
- [j9]Christoph Thiel:
Ein Reifegradmodell für das IT-Sicherheitsmanagement. HMD Prax. Wirtsch. 236 (2004) - 2003
- [c6]Stefan Jaksch, Stefan Pfennigschmidt, Kurt Sandkuhl, Christoph Thiel:
Information Logistic Applications for Information-on-Demand Scenarios: Concepts and Experiences from WIND Project. EUROMICRO 2003: 141-147 - [c5]Caroline Neufert, Christoph Thiel:
Informationslogistische Ansätze für CERTs. IMF 2003: 57-65 - 2002
- [j8]Frank Bourseau, Dirk Fox, Christoph Thiel:
Vorzüge und Grenzen des RSA-Verfahrens. Datenschutz und Datensicherheit 26(2) (2002) - [j7]Andreas Bertsch, Christoph Thiel:
Einwurf: Sicherheit im Business-to-Consumer-Markt - um jeden Preis? HMD Prax. Wirtsch. 224 (2002) - [j6]Andreas Bertsch, Christoph Thiel:
Mobile Endgeräte und ihre Eignung für sicheren M-Commerce. HMD Prax. Wirtsch. 224 (2002) - 2000
- [j5]Christoph Thiel:
Marktentwicklung im Umfeld digitaler Signaturen. Datenschutz und Datensicherheit 24(2) (2000) - [j4]Christoph Thiel:
Internationale Public-Key-Infrastrukturen aus Nutzersicht. Datenschutz und Datensicherheit 24(9) (2000)
1990 – 1999
- 1999
- [j3]Volker Müller, Andreas Stein, Christoph Thiel:
Computing discrete logarithms in real quadratic congruence function fields of large genus. Math. Comput. 68(226): 807-822 (1999) - 1996
- [c4]Ingrid Biehl, Bernd Meyer, Christoph Thiel:
Cryptographic Protocols Based on Real-Quadratic A-fields. ASIACRYPT 1996: 15-25 - 1995
- [b1]Christoph Thiel:
On the complexity of some problems in algorithmic algebraic number theory. Saarland University, Germany, 1995, pp. 1-129 - [j2]Christoph Thiel:
Short Proofs Using Compact Representations of Algebraic Integers. J. Complex. 11(3): 310-329 (1995) - 1994
- [c3]Christoph Thiel:
Under the assumption of the generalized Riemann Hyothesis verifying the class number belongs to NPcapCo-NP. ANTS 1994: 234-247 - [c2]Ingrid Biehl, Johannes A. Buchmann, Christoph Thiel:
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders. CRYPTO 1994: 56-60 - 1993
- [j1]Jürgen Friedrich, Uwe Früchtenicht, Jens Hoheisel, Volker Post, Thomas Renken, Marcus Joppe, Christoph Thiel, Frank Warnken, Volker Wiehle:
Die Gestaltung computergestützter Gruppenarbeit unter Berücksichtigung arbeitswissenschaftlicher Kriterien. Wirtschaftsinf. 35(2): 101-110 (1993) - 1992
- [c1]Ingrid Biehl, Johannes A. Buchmann, Bernd Meyer, Christian Thiel, Christoph Thiel:
Tools for Proving Zero Knowledge. EUROCRYPT 1992: 356-365
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint