74 Publications

2023 | Conference Paper | LibreCat-ID: 44855
Hemmrich, Simon, Jan Bobolz, Daniel Beverungen, and Johannes Blömer. “Designing Business Reputation Ecosystems — A Method for Issuing and Trading Monetary Ratings on a Blockchain.” In ECIS 2023 Research Papers, 2023.
LibreCat | Files available | Download (ext.)
 
2023 | Journal Article | LibreCat-ID: 45192
Götte, Thorsten, Kristian Hinnenthal, Christian Scheideler, and Julian Werthmann. “Time-Optimal Construction of Overlays.” Distributed Computing, 2023. https://doi.org/10.1007/s00446-023-00442-4.
LibreCat | DOI
 
2023 | Book Chapter | LibreCat-ID: 45891 | OA
Blömer, Johannes, Fabian Eidens, Tibor Jager, David Niehues, and Christian Scheideler. “Robustness and Security.” In On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake, Friedhelm Meyer auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike Wehrheim, 412:145–64. Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023. https://doi.org/10.5281/zenodo.8068629.
LibreCat | Files available | DOI
 
2023 | Book | LibreCat-ID: 45863 | OA
Haake, Claus-Jochen, Friedhelm Meyer auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike Wehrheim. On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets. Vol. 412. Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023. https://doi.org/10.17619/UNIPB/1-1797.
LibreCat | Files available | DOI
 
2023 | Conference Paper | LibreCat-ID: 35014 | OA
Blömer, Johannes, Jan Bobolz, and Henrik Bröcher. “On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC,” 2023.
LibreCat | Download (ext.)
 
2023 | Conference Paper | LibreCat-ID: 43458 | OA
Blömer, Johannes, Jan Bobolz, and Laurens Alexander Porzenheim. “A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices,” 2023.
LibreCat | Download (ext.)
 
2022 | Conference Paper | LibreCat-ID: 32602
Padalkin, Andreas, Christian Scheideler, and Daniel Warner. “The Structural Power of Reconfigurable Circuits in the Amoebot Model.” In 28th International Conference on DNA Computing and Molecular Programming (DNA 28), edited by Thomas E. Ouldridge and Shelley F. J. Wickham, 238:8:1–8:22. Leibniz International Proceedings in Informatics (LIPIcs). Dagstuhl, Germany: Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. https://doi.org/10.4230/LIPIcs.DNA.28.8.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 32603
Kostitsyna, Irina, Christian Scheideler, and Daniel Warner. “Fault-Tolerant Shape Formation in the Amoebot Model.” In 28th International Conference on DNA Computing and Molecular Programming (DNA 28), edited by Thomas E. Ouldridge and Shelley F. J. Wickham, 238:9:1–9:22. Leibniz International Proceedings in Informatics (LIPIcs). Dagstuhl, Germany: Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. https://doi.org/10.4230/LIPIcs.DNA.28.9.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 33240
Götte, Thorsten, and Christian Scheideler. “Brief Announcement: The (Limited) Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved Resilience through Collusion.” In SPAA ’22: 34th ACM Symposium on Parallelism in Algorithms and Architectures, Philadelphia, PA, USA, July 11 - 14, 2022, edited by Kunal Agrawal and I-Ting Angelina Lee, 99–101. ACM, 2022. https://doi.org/10.1145/3490148.3538556.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 30987
Kostitsyna, Irina, Christian Scheideler, and Daniel Warner. “Brief Announcement: Fault-Tolerant Shape Formation in the Amoebot Model.” In 1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022), edited by James Aspnes and Othon Michail, 221:23:1–23:3. Leibniz International Proceedings in Informatics (LIPIcs). Dagstuhl, Germany: Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. https://doi.org/10.4230/LIPIcs.SAND.2022.23.
LibreCat | DOI
 
2021 | Conference Paper | LibreCat-ID: 22283
Götte, Thorsten, Kristian Hinnenthal, Christian Scheideler, and Julian Werthmann. “Time-Optimal Construction of Overlays.” In Proc. of the 40th ACM Symposium on Principles of Distributed Computing (PODC ’21), edited by Keren Censor-Hillel. New York: ACM, n.d. https://doi.org/10.1145/3465084.3467932.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22057
Jager, Tibor, Rafael Kurek, and David Niehues. “Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.” In Public-Key Cryptography – PKC 2021. Cham, 2021. https://doi.org/10.1007/978-3-030-75245-3_22.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22059
Niehues, David. “Verifiable Random Functions with Optimal Tightness.” In Public-Key Cryptography – PKC 2021. Cham, 2021. https://doi.org/10.1007/978-3-030-75248-4_3.
LibreCat | Files available | DOI
 
2021 | Preprint | LibreCat-ID: 26645 | OA
Bobolz, Jan, Fabian Eidens, Raphael Heitjohann, and Jeremy Fell. “Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes.” IACR eprint, 2021.
LibreCat | Download (ext.)
 
2021 | Conference Paper | LibreCat-ID: 29566
Bobolz, Jan, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, and Kai Samelin. “Issuer-Hiding Attribute-Based Credentials.” In Cryptology and Network Security. Cham: Springer International Publishing, 2021. https://doi.org/10.1007/978-3-030-92548-2_9.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19551
Kurek, Rafael. “Efficient Forward-Secure Threshold Public Key Encryption.” In Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, edited by Joseph K. Liu and Hui Cui, 12248:330–49. Lecture Notes in Computer Science. Springer, 2020. https://doi.org/10.1007/978-3-030-55304-3\_17.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19553
Kurek, Rafael. “Efficient Forward-Secure Threshold Signatures.” In Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings, edited by Kazumaro Aoki and Akira Kanaoka, 12231:239–60. Lecture Notes in Computer Science. Springer, 2020. https://doi.org/10.1007/978-3-030-58208-1\_14.
LibreCat | DOI
 
2020 | Book Chapter | LibreCat-ID: 21396
Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” In Lecture Notes in Computer Science. Cham, 2020. https://doi.org/10.1007/978-3-030-38471-5_13.
LibreCat | Files available | DOI | Download (ext.)
 
2020 | Journal Article | LibreCat-ID: 13770
Karl, Holger, Dennis Kundisch, Friedhelm Meyer auf der Heide, and Heike Wehrheim. “A Case for a New IT Ecosystem: On-The-Fly Computing.” Business & Information Systems Engineering 62, no. 6 (2020): 467–81. https://doi.org/10.1007/s12599-019-00627-x.
LibreCat | Files available | DOI
 
2019 | Conference Paper | LibreCat-ID: 6976
Götte, Thorsten, Vipin Ravindran Vijayalakshmi, and Christian Scheideler. “Always Be Two Steps Ahead of Your Enemy - Maintaining a Routable Overlay under Massive Churn with an Almost Up-to-Date Adversary.” In Proceedings of the 2019 IEEE 33rd International Parallel  and Distributed Processing Symposium (IPDPS ’19). IEEE, n.d.
LibreCat | Files available
 
2019 | Journal Article | LibreCat-ID: 14830
Gmyr, Robert, Jonas Lefevre, and Christian Scheideler. “Self-Stabilizing Metric Graphs.” Theory Comput. Syst. 63, no. 2 (2019): 177–99. https://doi.org/10.1007/s00224-017-9823-4.
LibreCat | DOI
 
2019 | Conference Paper | LibreCat-ID: 13904 | OA
Blömer, Johannes, Jan Bobolz, Denis Pascal Diemert, and Fabian Eidens. “Updatable Anonymous Credentials and Applications to Incentive Systems.” In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19, 2019. https://doi.org/10.1145/3319535.3354223.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2862 | OA
Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” In Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, 470–90. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-76953-0_25.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Journal Article | LibreCat-ID: 2685
Blömer, Johannes, and Kathlén Kohn. “Voronoi Cells of Lattices with Respect to Arbitrary Norms.” SIAM Journal on Applied Algebra and Geometry. 2, no. 2 (2018): 314–38. https://doi.org/10.1137/17M1132045.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 3265 | OA
Bemmann, Kai, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Pascal Diemert, Fabian Eidens, Lukas Eilers, et al. “Fully-Featured Anonymous Credentials with Reputation System.” In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3234517.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 3422
Robinson, Peter, Christian Scheideler, and Alexander Setzer. “Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary.” In Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), n.d. https://doi.org/10.1145/3210377.3210399.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 2965
Blömer, Johannes, and Nils Löken. “Cloud Architectures for Searchable Encryption.” In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, 25:1--25:10. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3230853.
LibreCat | Files available | DOI
 
2018 | Working Paper | LibreCat-ID: 5820
Blömer, Johannes, Jan Bobolz, Christian Scheideler, and Alexander Setzer. Provably Anonymous Communication Based on Trusted Execution Environments, n.d.
LibreCat | Files available
 
2018 | Conference Paper | LibreCat-ID: 5985
Scheideler, Christian. “Relays: Towards a Link Layer for Robust and Secure Fog Computing.” In Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018, 1–2, 2018. https://doi.org/10.1145/3229774.3229781.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 5216
Scheideler, Christian, and Alexander Setzer. “Relays: A New Approach for the Finite Departure Problem in Overlay Networks.” In Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018), 2018. https://doi.org/10.1007/978-3-030-03232-6_16.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 3873 | OA
Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Enhanced Security of Attribute-Based Signatures.” In The International Conference on Cryptology And Network Security (CANS), 11124:235–55. Lecture Notes in Computer Science. Springer, 2018. https://doi.org/10.1007/978-3-030-00434-7_12.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2379 | OA
Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” In ACNS 2018 Applied Cryptography & Network Security. LNCS, n.d. https://doi.org/10.1007/978-3-319-93387-0_12.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-72453-9_35.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In Foundations and Practice of Security, 3–17. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-75650-9_1.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 215
Drees, Maximilian, Robert Gmyr, and Christian Scheideler. “Churn- and DoS-Resistant Overlay Networks Based on Network Reconfiguration.” In Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 417--427, 2016. https://doi.org/10.1145/2935764.2935783.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 208
Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes.” In Proceedings of the CT-RSA 2016, 431–47. LNCS, 2016. https://doi.org/10.1007/978-3-319-29485-8_25.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 155
Gmyr, Robert, Jonas Lefèvre, and Christian Scheideler. “Self-Stabilizing Metric Graphs.” In Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 248--262. LNCS, 2016. https://doi.org/10.1007/978-3-319-49259-9_20.
LibreCat | Files available | DOI
 
2015 | Conference Paper | LibreCat-ID: 253
Blömer, Johannes, Jakob Juhnke, and Nils Löken. “Short Group Signatures with Distributed Traceability.” In Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 166–80. LNCS, 2015. https://doi.org/10.1007/978-3-319-32859-1_14.
LibreCat | Files available | DOI
 
2015 | Journal Article | LibreCat-ID: 284
Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS Attacks.” Transactions on Parallel Computing, no. 3 (2015): 18:1--18:33. https://doi.org/10.1145/2809806.
LibreCat | Files available | DOI
 
2015 | Conference Paper | LibreCat-ID: 322 | OA
Blömer, Johannes, Jakob Juhnke, and Christina Kolb. “Anonymous and Publicly Linkable Reputation Systems.” In Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 478--488. LNCS, 2015. https://doi.org/10.1007/978-3-662-47854-7_29.
LibreCat | Files available | DOI | Download (ext.)
 
2015 | Report | LibreCat-ID: 233 | OA
Blömer, Johannes, and Kathlén Kohn. Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 346
Brangewitz, Sonja, Alexander Jungmann, Ronald Petrlic, and Marie Christin Platenius. “Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.” In Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 49–57, 2014.
LibreCat | Files available
 
2014 | Report | LibreCat-ID: 349
Sorge, Christoph. The Legal Classification of Identity-Based Signatures, 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 355
Blömer, Johannes, Peter Günther, and Gennadij Liske. “Tampering Attacks in Pairing-Based Cryptography.” In Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 1--7, 2014. https://doi.org/10.1109/FDTC.2014.10.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 366
Petrlic, Ronald, Alexander Jungmann, Marie Christin Platenius, Wilhelm Schäfer, and Christoph Sorge. “Security and Privacy Challenges in On-The-Fly Computing.” In Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014), 131–42, 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 371
Scheideler, Christian, Alexander Setzer, and Martina Eikel. “RoBuSt: A Crash-Failure-Resistant Distributed Storage System.” In Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 107--122. LNCS, 2014. https://doi.org/10.1007/978-3-319-14472-6_8.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 378
Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “Re-Chord: A Self-Stabilizing Chord Overlay Network.” Theory of Computing Systems, no. 3 (2014): 591–612. https://doi.org/10.1007/s00224-012-9431-2.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 384
Petrlic, Ronald, Sascha Lutters, and Christoph Sorge. “Privacy-Preserving Reputation Management.” In Proceedings of the 29th Symposium On Applied Computing (SAC), 1712–18, 2014. https://doi.org/10.1145/2554850.2554881.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 386
Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving Digital Rights Management Based on Attribute-Based Encryption.” In Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 1–5, 2014. https://doi.org/10.1109/NTMS.2014.6814044.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 387
Awerbuch, Baruch, Andrea W. Richa, Christian Scheideler, Stefan Schmid, and Jin Zhang. “Principles of Robust Medium Access and an Application to Leader Election.” Transactions on Algorithms, no. 4 (2014). https://doi.org/10.1145/2635818.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 441
Sorge, Christoph, and Ronald Petrlic. “Datenschutz Im Future Internet: Rechtliche Aspekte Und Technische Maßnahmen.” In Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.
LibreCat | Files available
 
2014 | Preprint | LibreCat-ID: 442 | OA
Blömer, Johannes, and Gennadij Liske. “Constructing CCA-Secure Predicate Encapsulation Schemes from CPA-Secure Schemes and Universal One-Way Hash Functions.” Universität Paderborn, 2014.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 446
Ogierman, Adrian, Andrea W. Richa, Christian Scheideler, Stefan Schmid, and Jin Zhang. “Competitive MAC under Adversarial SINR.” In Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2751--2759, 2014. https://doi.org/10.1109/INFOCOM.2014.6848224.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 463
Blömer, Johannes, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, and Jean-Pierre Seifert. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” In Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 123--136, 2014. https://doi.org/10.1109/FDTC.2014.22.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 479
Sorge, Christoph. “The Legal Classification of Identity-Based Signatures.” Computer Law & Security Review 30, no. 2 (2014): 126–36. https://doi.org/10.1016/j.clsr.2014.01.002.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 401
Platenius, Marie Christin, Svetlana Arifulina, Ronald Petrlic, and Wilhelm Schäfer. “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.” In Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 6–17. Communications in Computer and Information Science, 2014. https://doi.org/10.1007/978-3-319-14886-1_2.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 410
Jungmann, Alexander, Sonja Brangewitz, Ronald Petrlic, and Marie Christin Platenius. “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.” International Journal On Advances in Intelligent Systems (IntSys) 7, no. 3&4 (2014): 572--594.
LibreCat | Files available | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 473
Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” In Data and Applications Security and Privacy XXVII, edited by Lingyu Wang and Basit Shafiq, 289–96. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-642-39256-6_21.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 475
Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” In Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 259–64, 2013. https://doi.org/10.1109/CCNC.2013.6488456.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 488
Blömer, Johannes, Peter Günther, and Volker Krummel. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” In Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 98–105, 2013.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 519
Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS-Attacks.” In Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 119–29, 2013. https://doi.org/10.1145/2486159.2486186.
LibreCat | Files available | DOI
 
2013 | Preprint | LibreCat-ID: 538 | OA
Blömer, Johannes, and Gennadij Liske. “Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn, 2013.
LibreCat | Files available | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 542
Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage System.” In Proceedings of the 27th International Symposium on Distributed Computing (DISC), 537–49. LNCS, 2013. https://doi.org/10.1007/978-3-642-41527-2_37.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 546
Graffi, Kalman, Markus Benter, Mohammad Divband, Sebastian Kniesburges, and Andreas Koutsopoulos. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord Overlay Network.” In Proceedings of the Conference on Networked Systems (NetSys), 27–34, 2013. https://doi.org/10.1109/NetSys.2013.11.
LibreCat | Files available | DOI
 
2013 | Journal Article | LibreCat-ID: 561
Petrlic, Ronald, Stephan Sekula, and Christoph Sorge. “A Privacy-Friendly Architecture for Future Cloud Computing.” International Journal of Grid and Utility Computing, no. 4 (2013): 265–77. https://doi.org/10.1504/IJGUC.2013.057120.
LibreCat | Files available | DOI | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 528
Riebler, Heinrich, Tobias Kenter, Christoph Sorge, and Christian Plessl. “FPGA-Accelerated Key Search for Cold-Boot Attacks against AES.” In Proceedings of the International Conference on Field-Programmable Technology (FPT), 386–89. IEEE, 2013. https://doi.org/10.1109/FPT.2013.6718394.
LibreCat | Files available | DOI
 
2012 | Conference (Editor) | LibreCat-ID: 577
Richa, Andrea W., and Christian Scheideler, eds. Stabilization, Safety, and Security of Distributed Systems, 2012. https://doi.org/10.1007/978-3-642-33536-5.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 581
Drees, Maximilian, Martina Hüllmann (married name: Eikel), Andreas Koutsopoulos, and Christian Scheideler. “Self-Organizing Particle Systems.” In Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 1272–83, 2012. https://doi.org/10.1109/IPDPS.2012.116.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 585
Petrlic, Ronald. “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.” In Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS), 194–211. LNCS, 2012. https://doi.org/10.1007/978-3-642-35362-8_16.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 588
Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving DRM for Cloud Computing.” In Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 1286–91, 2012. https://doi.org/10.1109/WAINA.2012.92.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 589
Petrlic, Ronald. “Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.” In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 958–63, 2012. https://doi.org/10.1109/TrustCom.2012.225.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 623
Richa, Andrea W., Christian Scheideler, Stefan Schmid, and Jin Zhang. “Competitive and Fair Throughput for Co-Existing Networks under Adversarial Interference.” In Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC), 291–300, 2012. https://doi.org/10.1145/2332432.2332488.
LibreCat | Files available | DOI
 
2011 | Conference Paper | LibreCat-ID: 645
Doerr, Benjamin, Leslie Ann Goldberg, Lorenz Minder, Thomas Sauerwald, and Christian Scheideler. “Stabilizing Consensus with the Power of Two Choices.” In Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 149–58, 2011. https://doi.org/10.1145/1989493.1989516.
LibreCat | Files available | DOI
 
2011 | Conference Paper | LibreCat-ID: 646
Richa, Andrea W., and Christian Scheideler. “Self-Stabilizing DeBruijn Networks.” In Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 416–30. LNCS, 2011. https://doi.org/10.1007/978-3-642-24550-3_31.
LibreCat | Files available | DOI
 

Filters and Search Terms

project=13

(type<>bachelorsthesis AND type<>mastersthesis AND type <> dissertation)

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export