74 Publications

2023 | Conference Paper | LibreCat-ID: 44855
S. Hemmrich, J. Bobolz, D. Beverungen, and J. Blömer, “Designing Business Reputation Ecosystems — A Method for Issuing and Trading Monetary Ratings on a Blockchain,” presented at the ECIS 2023, 2023.
LibreCat | Files available | Download (ext.)
 
2023 | Journal Article | LibreCat-ID: 45192
T. Götte, K. Hinnenthal, C. Scheideler, and J. Werthmann, “Time-Optimal Construction of Overlays,” Distributed Computing, 2023, doi: https://doi.org/10.1007/s00446-023-00442-4.
LibreCat | DOI
 
2023 | Book Chapter | LibreCat-ID: 45891 | OA
J. Blömer, F. Eidens, T. Jager, D. Niehues, and C. Scheideler, “Robustness and Security,” in On-The-Fly Computing -- Individualized IT-services in dynamic markets, vol. 412, C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–164.
LibreCat | Files available | DOI
 
2023 | Book | LibreCat-ID: 45863 | OA
C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, On-The-Fly Computing -- Individualized IT-services in dynamic markets, vol. 412. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023.
LibreCat | Files available | DOI
 
2023 | Conference Paper | LibreCat-ID: 35014 | OA
J. Blömer, J. Bobolz, and H. Bröcher, “On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC,” presented at the TCC 2023, Taipeh, Taiwan, 2023.
LibreCat | Download (ext.)
 
2023 | Conference Paper | LibreCat-ID: 43458 | OA
J. Blömer, J. Bobolz, and L. A. Porzenheim, “A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices,” presented at the Asiacrypt 2023, Guangzhou, China, 2023.
LibreCat | Download (ext.)
 
2022 | Conference Paper | LibreCat-ID: 32602
A. Padalkin, C. Scheideler, and D. Warner, “The Structural Power of Reconfigurable Circuits in the Amoebot Model,” in 28th International Conference on DNA Computing and Molecular Programming (DNA 28), 2022, vol. 238, p. 8:1–8:22, doi: 10.4230/LIPIcs.DNA.28.8.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 32603
I. Kostitsyna, C. Scheideler, and D. Warner, “Fault-Tolerant Shape Formation in the Amoebot Model,” in 28th International Conference on DNA Computing and Molecular Programming (DNA 28), 2022, vol. 238, p. 9:1–9:22, doi: 10.4230/LIPIcs.DNA.28.9.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 33240
T. Götte and C. Scheideler, “Brief Announcement: The (Limited) Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved Resilience through Collusion,” in SPAA ’22: 34th ACM Symposium on Parallelism in Algorithms and Architectures, Philadelphia, PA, USA, July 11 - 14, 2022, 2022, pp. 99–101, doi: 10.1145/3490148.3538556.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 30987
I. Kostitsyna, C. Scheideler, and D. Warner, “Brief Announcement: Fault-Tolerant Shape Formation in the Amoebot Model,” in 1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022), 2022, vol. 221, p. 23:1–23:3, doi: 10.4230/LIPIcs.SAND.2022.23.
LibreCat | DOI
 
2021 | Conference Paper | LibreCat-ID: 22283
T. Götte, K. Hinnenthal, C. Scheideler, and J. Werthmann, “Time-Optimal Construction of Overlays,” in Proc. of the 40th ACM Symposium on Principles of Distributed Computing (PODC ’21), Virtual.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22057
T. Jager, R. Kurek, and D. Niehues, “Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance,” in Public-Key Cryptography – PKC 2021, Cham, 2021.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22059
D. Niehues, “Verifiable Random Functions with Optimal Tightness,” in Public-Key Cryptography – PKC 2021, Cham, 2021.
LibreCat | Files available | DOI
 
2021 | Preprint | LibreCat-ID: 26645 | OA
J. Bobolz, F. Eidens, R. Heitjohann, and J. Fell, “Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes.” IACR eprint, 2021.
LibreCat | Download (ext.)
 
2021 | Conference Paper | LibreCat-ID: 29566
J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, and K. Samelin, “Issuer-Hiding Attribute-Based Credentials,” 2021, doi: 10.1007/978-3-030-92548-2_9.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19551
R. Kurek, “Efficient Forward-Secure Threshold Public Key Encryption,” in Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, 2020, vol. 12248, pp. 330–349.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19553
R. Kurek, “Efficient Forward-Secure Threshold Signatures,” in Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings, 2020, vol. 12231, pp. 239–260.
LibreCat | DOI
 
2020 | Book Chapter | LibreCat-ID: 21396
T. Jager and D. Niehues, “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions,” in Lecture Notes in Computer Science, Cham, 2020.
LibreCat | Files available | DOI | Download (ext.)
 
2020 | Journal Article | LibreCat-ID: 13770
H. Karl, D. Kundisch, F. Meyer auf der Heide, and H. Wehrheim, “A Case for a New IT Ecosystem: On-The-Fly Computing,” Business & Information Systems Engineering, vol. 62, no. 6, pp. 467–481, 2020, doi: 10.1007/s12599-019-00627-x.
LibreCat | Files available | DOI
 
2019 | Conference Paper | LibreCat-ID: 6976
T. Götte, V. R. Vijayalakshmi, and C. Scheideler, “Always be Two Steps Ahead of Your Enemy - Maintaining a Routable Overlay under Massive Churn with an Almost Up-to-date Adversary,” in Proceedings of the 2019 IEEE 33rd International Parallel  and Distributed Processing Symposium (IPDPS ’19), Rio de Janeiro, Brazil.
LibreCat | Files available
 
2019 | Journal Article | LibreCat-ID: 14830
R. Gmyr, J. Lefevre, and C. Scheideler, “Self-Stabilizing Metric Graphs,” Theory Comput. Syst., vol. 63, no. 2, pp. 177–199, 2019.
LibreCat | DOI
 
2019 | Conference Paper | LibreCat-ID: 13904 | OA
J. Blömer, J. Bobolz, D. P. Diemert, and F. Eidens, “Updatable Anonymous Credentials and Applications to Incentive Systems,” presented at the 26th ACM Conference on Computer and Communications Security, London, 2019, doi: 10.1145/3319535.3354223.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2862 | OA
J. Blömer, F. Eidens, and J. Juhnke, “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems,” in Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, San Francisco, CA, USA, 2018, pp. 470–490.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Journal Article | LibreCat-ID: 2685
J. Blömer and K. Kohn, “Voronoi Cells of Lattices with Respect to Arbitrary Norms,” SIAM Journal on Applied Algebra and Geometry., vol. 2, no. 2, pp. 314–338, 2018.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 3265 | OA
K. Bemmann et al., “Fully-Featured Anonymous Credentials with Reputation System,” in Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, Hamburg, Germany.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 3422
P. Robinson, C. Scheideler, and A. Setzer, “Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary,” in Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), Wien.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 2965
J. Blömer and N. Löken, “Cloud Architectures for Searchable Encryption,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, pp. 25:1--25:10.
LibreCat | Files available | DOI
 
2018 | Working Paper | LibreCat-ID: 5820
J. Blömer, J. Bobolz, C. Scheideler, and A. Setzer, Provably Anonymous Communication Based on Trusted Execution Environments. .
LibreCat | Files available
 
2018 | Conference Paper | LibreCat-ID: 5985
C. Scheideler, “Relays: Towards a Link Layer for Robust and Secure Fog Computing,” in Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018, 2018, pp. 1–2.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 5216
C. Scheideler and A. Setzer, “Relays: A New Approach for the Finite Departure Problem in Overlay Networks,” in Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018), Tokyo, Japan, 2018.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 3873 | OA
J. Blömer, F. Eidens, and J. Juhnke, “Enhanced Security of Attribute-Based Signatures,” in The International Conference on Cryptology And Network Security (CANS), Naples, Italy, 2018, vol. 11124, pp. 235–255, doi: 10.1007/978-3-030-00434-7_12.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2379 | OA
J. Blömer and J. Bobolz, “Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures,” presented at the The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, doi: 10.1007/978-3-319-93387-0_12.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2967 | OA
J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 2017, vol. 10693, pp. 438–453.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2344 | OA
J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in Foundations and Practice of Security, 2017, pp. 3–17.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 215
M. Drees, R. Gmyr, and C. Scheideler, “Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration,” in Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2016, pp. 417--427.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 208
J. Blömer and G. Liske, “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes,” in Proceedings of the CT-RSA 2016, 2016, pp. 431–447.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 155
R. Gmyr, J. Lefèvre, and C. Scheideler, “Self-stabilizing Metric Graphs,” in Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2016, pp. 248--262.
LibreCat | Files available | DOI
 
2015 | Conference Paper | LibreCat-ID: 253
J. Blömer, J. Juhnke, and N. Löken, “Short Group Signatures with Distributed Traceability,” in Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
LibreCat | Files available | DOI
 
2015 | Journal Article | LibreCat-ID: 284
M. Eikel and C. Scheideler, “IRIS: A Robust Information System Against Insider DoS Attacks,” Transactions on Parallel Computing, no. 3, pp. 18:1--18:33, 2015.
LibreCat | Files available | DOI
 
2015 | Conference Paper | LibreCat-ID: 322 | OA
J. Blömer, J. Juhnke, and C. Kolb, “Anonymous and Publicly Linkable Reputation Systems,” in Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat | Files available | DOI | Download (ext.)
 
2015 | Report | LibreCat-ID: 233 | OA
J. Blömer and K. Kohn, Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 346
S. Brangewitz, A. Jungmann, R. Petrlic, and M. C. Platenius, “Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services,” in Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2014, pp. 49–57.
LibreCat | Files available
 
2014 | Report | LibreCat-ID: 349
C. Sorge, The Legal Classification of Identity-Based Signatures. 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 355
J. Blömer, P. Günther, and G. Liske, “Tampering attacks in pairing-based cryptography,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 366
R. Petrlic, A. Jungmann, M. C. Platenius, W. Schäfer, and C. Sorge, “Security and Privacy Challenges in On-The-Fly Computing,” in Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014), 2014, pp. 131–142.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 371
C. Scheideler, A. Setzer, and M. Eikel, “RoBuSt: A Crash-Failure-Resistant Distributed Storage System,” in Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 378
S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “Re-Chord: A Self-stabilizing Chord Overlay Network,” Theory of Computing Systems, no. 3, pp. 591–612, 2014.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 384
R. Petrlic, S. Lutters, and C. Sorge, “Privacy-Preserving Reputation Management,” in Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–1718.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 386
R. Petrlic and C. Sorge, “Privacy-Preserving Digital Rights Management based on Attribute-based Encryption,” in Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 387
B. Awerbuch, A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Principles of Robust Medium Access and an Application to Leader Election,” Transactions on Algorithms, no. 4, 2014.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 441
C. Sorge and R. Petrlic, “Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen,” in Tagungsband des 17. Internationalen Rechtsinformatik Symposions, 2014.
LibreCat | Files available
 
2014 | Preprint | LibreCat-ID: 442 | OA
J. Blömer and G. Liske, “Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions.” Universität Paderborn, 2014.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 446
A. Ogierman, A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Competitive MAC under adversarial SINR,” in Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 463
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, and J.-P. Seifert, “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 479
C. Sorge, “The Legal Classification of Identity-Based Signatures,” Computer Law & Security Review, vol. 30, no. 2, pp. 126–136, 2014.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 401
M. C. Platenius, S. Arifulina, R. Petrlic, and W. Schäfer, “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching,” in Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 410
A. Jungmann, S. Brangewitz, R. Petrlic, and M. C. Platenius, “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services,” International Journal On Advances in Intelligent Systems (IntSys), vol. 7, no. 3&4, pp. 572--594, 2014.
LibreCat | Files available | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 473
R. Petrlic and S. Sekula, “Unlinkable content playbacks in a multiparty DRM system,” in Data and Applications Security and Privacy XXVII, 2013, pp. 289–296.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 475
N. Joshi and R. Petrlic, “Towards practical privacy-preserving Digital Rights Management for Cloud Computing,” in Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–264.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 488
J. Blömer, P. Günther, and V. Krummel, “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study,” in Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 519
M. Eikel and C. Scheideler, “IRIS: A Robust Information System Against Insider DoS-Attacks,” in Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 119–129.
LibreCat | Files available | DOI
 
2013 | Preprint | LibreCat-ID: 538 | OA
J. Blömer and G. Liske, “Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn, 2013.
LibreCat | Files available | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 542
S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system,” in Proceedings of the 27th International Symposium on Distributed Computing (DISC), 2013, pp. 537–549.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 546
K. Graffi, M. Benter, M. Divband, S. Kniesburges, and A. Koutsopoulos, “Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network,” in Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 27–34.
LibreCat | Files available | DOI
 
2013 | Journal Article | LibreCat-ID: 561
R. Petrlic, S. Sekula, and C. Sorge, “A privacy-friendly Architecture for future Cloud Computing,” International Journal of Grid and Utility Computing, no. 4, pp. 265–277, 2013.
LibreCat | Files available | DOI | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 528
H. Riebler, T. Kenter, C. Sorge, and C. Plessl, “FPGA-accelerated Key Search for Cold-Boot Attacks against AES,” in Proceedings of the International Conference on Field-Programmable Technology (FPT), 2013, pp. 386–389, doi: 10.1109/FPT.2013.6718394.
LibreCat | Files available | DOI
 
2012 | Conference (Editor) | LibreCat-ID: 577
A. W. Richa and C. Scheideler, Eds., Stabilization, Safety, and Security of Distributed Systems. 2012.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 581
M. Drees, M. Hüllmann (married name: Eikel), A. Koutsopoulos, and C. Scheideler, “Self-Organizing Particle Systems,” in Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2012, pp. 1272–1283.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 585
R. Petrlic, “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme,” in Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS), 2012, pp. 194–211.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 588
R. Petrlic and C. Sorge, “Privacy-Preserving DRM for Cloud Computing,” in Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012, pp. 1286–1291.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 589
R. Petrlic, “Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment,” in Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 958–963.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 623
A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Competitive and fair throughput for co-existing networks under adversarial interference,” in Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC), 2012, pp. 291–300.
LibreCat | Files available | DOI
 
2011 | Conference Paper | LibreCat-ID: 645
B. Doerr, L. A. Goldberg, L. Minder, T. Sauerwald, and C. Scheideler, “Stabilizing consensus with the power of two choices,” in Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2011, pp. 149–158.
LibreCat | Files available | DOI
 
2011 | Conference Paper | LibreCat-ID: 646
A. W. Richa and C. Scheideler, “Self-Stabilizing DeBruijn Networks,” in Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2011, pp. 416–430.
LibreCat | Files available | DOI
 

Filters and Search Terms

project=13

(type<>bachelorsthesis AND type<>mastersthesis AND type <> dissertation)

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export