74 Publications

2023 | Conference Paper | LibreCat-ID: 44855
Hemmrich, Simon, et al. “Designing Business Reputation Ecosystems — A Method for Issuing and Trading Monetary Ratings on a Blockchain.” ECIS 2023 Research Papers, 2023.
LibreCat | Files available | Download (ext.)
 
2023 | Journal Article | LibreCat-ID: 45192
Götte, Thorsten, et al. “Time-Optimal Construction of Overlays.” Distributed Computing, 2023, doi:https://doi.org/10.1007/s00446-023-00442-4.
LibreCat | DOI
 
2023 | Book Chapter | LibreCat-ID: 45891 | OA
Blömer, Johannes, et al. “Robustness and Security.” On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake et al., vol. 412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–64, doi:10.5281/zenodo.8068629.
LibreCat | Files available | DOI
 
2023 | Book | LibreCat-ID: 45863 | OA
Haake, Claus-Jochen, et al. On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets. Heinz Nixdorf Institut, Universität Paderborn, 2023, doi:10.17619/UNIPB/1-1797.
LibreCat | Files available | DOI
 
2023 | Conference Paper | LibreCat-ID: 35014 | OA
Blömer, Johannes, et al. On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC. 2023.
LibreCat | Download (ext.)
 
2023 | Conference Paper | LibreCat-ID: 43458 | OA
Blömer, Johannes, et al. A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices. 2023.
LibreCat | Download (ext.)
 
2022 | Conference Paper | LibreCat-ID: 32602
Padalkin, Andreas, et al. “The Structural Power of Reconfigurable Circuits in the Amoebot Model.” 28th International Conference on DNA Computing and Molecular Programming (DNA 28), edited by Thomas E. Ouldridge and Shelley F. J. Wickham, vol. 238, Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022, p. 8:1–8:22, doi:10.4230/LIPIcs.DNA.28.8.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 32603
Kostitsyna, Irina, et al. “Fault-Tolerant Shape Formation in the Amoebot Model.” 28th International Conference on DNA Computing and Molecular Programming (DNA 28), edited by Thomas E. Ouldridge and Shelley F. J. Wickham, vol. 238, Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022, p. 9:1–9:22, doi:10.4230/LIPIcs.DNA.28.9.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 33240
Götte, Thorsten, and Christian Scheideler. “Brief Announcement: The (Limited) Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved Resilience through Collusion.” SPAA ’22: 34th ACM Symposium on Parallelism in Algorithms and Architectures, Philadelphia, PA, USA, July 11 - 14, 2022, edited by Kunal Agrawal and I-Ting Angelina Lee, ACM, 2022, pp. 99–101, doi:10.1145/3490148.3538556.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 30987
Kostitsyna, Irina, et al. “Brief Announcement: Fault-Tolerant Shape Formation in the Amoebot Model.” 1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022), edited by James Aspnes and Othon Michail, vol. 221, Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022, p. 23:1–23:3, doi:10.4230/LIPIcs.SAND.2022.23.
LibreCat | DOI
 
2021 | Conference Paper | LibreCat-ID: 22283
Götte, Thorsten, et al. “Time-Optimal Construction of Overlays.” Proc. of the 40th ACM Symposium on Principles of Distributed Computing (PODC ’21), edited by Keren Censor-Hillel, ACM, doi:10.1145/3465084.3467932.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22057
Jager, Tibor, et al. “Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.” Public-Key Cryptography – PKC 2021, 2021, doi:10.1007/978-3-030-75245-3_22.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22059
Niehues, David. “Verifiable Random Functions with Optimal Tightness.” Public-Key Cryptography – PKC 2021, 2021, doi:10.1007/978-3-030-75248-4_3.
LibreCat | Files available | DOI
 
2021 | Preprint | LibreCat-ID: 26645 | OA
Bobolz, Jan, et al. Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes. IACR eprint, 2021.
LibreCat | Download (ext.)
 
2021 | Conference Paper | LibreCat-ID: 29566
Bobolz, Jan, et al. “Issuer-Hiding Attribute-Based Credentials.” Cryptology and Network Security, Springer International Publishing, 2021, doi:10.1007/978-3-030-92548-2_9.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19551
Kurek, Rafael. “Efficient Forward-Secure Threshold Public Key Encryption.” Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, edited by Joseph K. Liu and Hui Cui, vol. 12248, Springer, 2020, pp. 330–49, doi:10.1007/978-3-030-55304-3\_17.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19553
Kurek, Rafael. “Efficient Forward-Secure Threshold Signatures.” Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings, edited by Kazumaro Aoki and Akira Kanaoka, vol. 12231, Springer, 2020, pp. 239–60, doi:10.1007/978-3-030-58208-1\_14.
LibreCat | DOI
 
2020 | Book Chapter | LibreCat-ID: 21396
Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” Lecture Notes in Computer Science, 2020, doi:10.1007/978-3-030-38471-5_13.
LibreCat | Files available | DOI | Download (ext.)
 
2020 | Journal Article | LibreCat-ID: 13770
Karl, Holger, et al. “A Case for a New IT Ecosystem: On-The-Fly Computing.” Business & Information Systems Engineering, vol. 62, no. 6, Springer, 2020, pp. 467–81, doi:10.1007/s12599-019-00627-x.
LibreCat | Files available | DOI
 
2019 | Conference Paper | LibreCat-ID: 6976
Götte, Thorsten, et al. “Always Be Two Steps Ahead of Your Enemy - Maintaining a Routable Overlay under Massive Churn with an Almost Up-to-Date Adversary.” Proceedings of the 2019 IEEE 33rd International Parallel  and Distributed Processing Symposium (IPDPS ’19), IEEE.
LibreCat | Files available
 
2019 | Journal Article | LibreCat-ID: 14830
Gmyr, Robert, et al. “Self-Stabilizing Metric Graphs.” Theory Comput. Syst., vol. 63, no. 2, 2019, pp. 177–99, doi:10.1007/s00224-017-9823-4.
LibreCat | DOI
 
2019 | Conference Paper | LibreCat-ID: 13904 | OA
Blömer, Johannes, et al. “Updatable Anonymous Credentials and Applications to Incentive Systems.” Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19, 2019, doi:10.1145/3319535.3354223.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2862 | OA
Blömer, Johannes, et al. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, 2018, pp. 470–90, doi:10.1007/978-3-319-76953-0_25.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Journal Article | LibreCat-ID: 2685
Blömer, Johannes, and Kathlén Kohn. “Voronoi Cells of Lattices with Respect to Arbitrary Norms.” SIAM Journal on Applied Algebra and Geometry., vol. 2, no. 2, 2018, pp. 314–38, doi:10.1137/17M1132045.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 3265 | OA
Bemmann, Kai, et al. “Fully-Featured Anonymous Credentials with Reputation System.” Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, doi:10.1145/3230833.3234517.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 3422
Robinson, Peter, et al. “Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary.” Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), doi:10.1145/3210377.3210399.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 2965
Blömer, Johannes, and Nils Löken. “Cloud Architectures for Searchable Encryption.” Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, ACM, pp. 25:1--25:10, doi:10.1145/3230833.3230853.
LibreCat | Files available | DOI
 
2018 | Working Paper | LibreCat-ID: 5820
Blömer, Johannes, et al. Provably Anonymous Communication Based on Trusted Execution Environments.
LibreCat | Files available
 
2018 | Conference Paper | LibreCat-ID: 5985
Scheideler, Christian. “Relays: Towards a Link Layer for Robust and Secure Fog Computing.” Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018, 2018, pp. 1–2, doi:10.1145/3229774.3229781.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 5216
Scheideler, Christian, and Alexander Setzer. “Relays: A New Approach for the Finite Departure Problem in Overlay Networks.” Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018), 2018, doi:10.1007/978-3-030-03232-6_16.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 3873 | OA
Blömer, Johannes, et al. “Enhanced Security of Attribute-Based Signatures.” The International Conference on Cryptology And Network Security (CANS), vol. 11124, Springer, 2018, pp. 235–55, doi:10.1007/978-3-030-00434-7_12.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2379 | OA
Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” ACNS 2018 Applied Cryptography & Network Security, doi:10.1007/978-3-319-93387-0_12.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:10.1007/978-3-319-72453-9_35.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” Foundations and Practice of Security, Springer International Publishing, 2017, pp. 3–17, doi:10.1007/978-3-319-75650-9_1.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 215
Drees, Maximilian, et al. “Churn- and DoS-Resistant Overlay Networks Based on Network Reconfiguration.” Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2016, pp. 417--427, doi:10.1145/2935764.2935783.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 208
Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes.” Proceedings of the CT-RSA 2016, 2016, pp. 431–47, doi:10.1007/978-3-319-29485-8_25.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 155
Gmyr, Robert, et al. “Self-Stabilizing Metric Graphs.” Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2016, pp. 248--262, doi:10.1007/978-3-319-49259-9_20.
LibreCat | Files available | DOI
 
2015 | Conference Paper | LibreCat-ID: 253
Blömer, Johannes, et al. “Short Group Signatures with Distributed Traceability.” Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–80, doi:10.1007/978-3-319-32859-1_14.
LibreCat | Files available | DOI
 
2015 | Journal Article | LibreCat-ID: 284
Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS Attacks.” Transactions on Parallel Computing, no. 3, ACM, 2015, pp. 18:1--18:33, doi:10.1145/2809806.
LibreCat | Files available | DOI
 
2015 | Conference Paper | LibreCat-ID: 322 | OA
Blömer, Johannes, et al. “Anonymous and Publicly Linkable Reputation Systems.” Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488, doi:10.1007/978-3-662-47854-7_29.
LibreCat | Files available | DOI | Download (ext.)
 
2015 | Report | LibreCat-ID: 233 | OA
Blömer, Johannes, and Kathlén Kohn. Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 346
Brangewitz, Sonja, et al. “Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.” Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2014, pp. 49–57.
LibreCat | Files available
 
2014 | Report | LibreCat-ID: 349
Sorge, Christoph. The Legal Classification of Identity-Based Signatures. 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 355
Blömer, Johannes, et al. “Tampering Attacks in Pairing-Based Cryptography.” Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7, doi:10.1109/FDTC.2014.10.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 366
Petrlic, Ronald, et al. “Security and Privacy Challenges in On-The-Fly Computing.” Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014), 2014, pp. 131–42.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 371
Scheideler, Christian, et al. “RoBuSt: A Crash-Failure-Resistant Distributed Storage System.” Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122, doi:10.1007/978-3-319-14472-6_8.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 378
Kniesburges, Sebastian, et al. “Re-Chord: A Self-Stabilizing Chord Overlay Network.” Theory of Computing Systems, no. 3, Springer, 2014, pp. 591–612, doi:10.1007/s00224-012-9431-2.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 384
Petrlic, Ronald, et al. “Privacy-Preserving Reputation Management.” Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–18, doi:10.1145/2554850.2554881.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 386
Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving Digital Rights Management Based on Attribute-Based Encryption.” Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5, doi:10.1109/NTMS.2014.6814044.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 387
Awerbuch, Baruch, et al. “Principles of Robust Medium Access and an Application to Leader Election.” Transactions on Algorithms, no. 4, ACM, 2014, doi:10.1145/2635818.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 441
Sorge, Christoph, and Ronald Petrlic. “Datenschutz Im Future Internet: Rechtliche Aspekte Und Technische Maßnahmen.” Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.
LibreCat | Files available
 
2014 | Preprint | LibreCat-ID: 442 | OA
Blömer, Johannes, and Gennadij Liske. Constructing CCA-Secure Predicate Encapsulation Schemes from CPA-Secure Schemes and Universal One-Way Hash Functions. Universität Paderborn, 2014.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 446
Ogierman, Adrian, et al. “Competitive MAC under Adversarial SINR.” Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759, doi:10.1109/INFOCOM.2014.6848224.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 463
Blömer, Johannes, et al. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136, doi:10.1109/FDTC.2014.22.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 479
Sorge, Christoph. “The Legal Classification of Identity-Based Signatures.” Computer Law & Security Review, vol. 30, no. 2, Elsevier, 2014, pp. 126–36, doi:10.1016/j.clsr.2014.01.002.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 401
Platenius, Marie Christin, et al. “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.” Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17, doi:10.1007/978-3-319-14886-1_2.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 410
Jungmann, Alexander, et al. “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.” International Journal On Advances in Intelligent Systems (IntSys), vol. 7, no. 3&4, IARIA, 2014, pp. 572--594.
LibreCat | Files available | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 473
Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” Data and Applications Security and Privacy XXVII, edited by Lingyu Wang and Basit Shafiq, 2013, pp. 289–96, doi:10.1007/978-3-642-39256-6_21.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 475
Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–64, doi:10.1109/CCNC.2013.6488456.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 488
Blömer, Johannes, et al. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 519
Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS-Attacks.” Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 119–29, doi:10.1145/2486159.2486186.
LibreCat | Files available | DOI
 
2013 | Preprint | LibreCat-ID: 538 | OA
Blömer, Johannes, and Gennadij Liske. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. Universität Paderborn, 2013.
LibreCat | Files available | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 542
Kniesburges, Sebastian, et al. “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage System.” Proceedings of the 27th International Symposium on Distributed Computing (DISC), 2013, pp. 537–49, doi:10.1007/978-3-642-41527-2_37.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 546
Graffi, Kalman, et al. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord Overlay Network.” Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 27–34, doi:10.1109/NetSys.2013.11.
LibreCat | Files available | DOI
 
2013 | Journal Article | LibreCat-ID: 561
Petrlic, Ronald, et al. “A Privacy-Friendly Architecture for Future Cloud Computing.” International Journal of Grid and Utility Computing, no. 4, InderScience, 2013, pp. 265–77, doi:10.1504/IJGUC.2013.057120.
LibreCat | Files available | DOI | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 528
Riebler, Heinrich, et al. “FPGA-Accelerated Key Search for Cold-Boot Attacks against AES.” Proceedings of the International Conference on Field-Programmable Technology (FPT), IEEE, 2013, pp. 386–89, doi:10.1109/FPT.2013.6718394.
LibreCat | Files available | DOI
 
2012 | Conference (Editor) | LibreCat-ID: 577
Richa, Andrea W., and Christian Scheideler, editors. Stabilization, Safety, and Security of Distributed Systems. 2012, doi:10.1007/978-3-642-33536-5.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 581
Drees, Maximilian, et al. “Self-Organizing Particle Systems.” Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2012, pp. 1272–83, doi:10.1109/IPDPS.2012.116.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 585
Petrlic, Ronald. “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.” Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS), 2012, pp. 194–211, doi:10.1007/978-3-642-35362-8_16.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 588
Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving DRM for Cloud Computing.” Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012, pp. 1286–91, doi:10.1109/WAINA.2012.92.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 589
Petrlic, Ronald. “Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.” Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 958–63, doi:10.1109/TrustCom.2012.225.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 623
Richa, Andrea W., et al. “Competitive and Fair Throughput for Co-Existing Networks under Adversarial Interference.” Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC), 2012, pp. 291–300, doi:10.1145/2332432.2332488.
LibreCat | Files available | DOI
 
2011 | Conference Paper | LibreCat-ID: 645
Doerr, Benjamin, et al. “Stabilizing Consensus with the Power of Two Choices.” Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2011, pp. 149–58, doi:10.1145/1989493.1989516.
LibreCat | Files available | DOI
 
2011 | Conference Paper | LibreCat-ID: 646
Richa, Andrea W., and Christian Scheideler. “Self-Stabilizing DeBruijn Networks.” Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2011, pp. 416–30, doi:10.1007/978-3-642-24550-3_31.
LibreCat | Files available | DOI
 

Filters and Search Terms

project=13

(type<>bachelorsthesis AND type<>mastersthesis AND type <> dissertation)

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export