[{"status":"public","type":"conference","publication":"29th International Symposium on Algorithms and Computation  (ISAAC 2018)","language":[{"iso":"eng"}],"user_id":"13291","department":[{"_id":"64"}],"project":[{"_id":"45","name":"Soft-Clustering - Von Heuristiken zu Approximationsalgorithmen"}],"_id":"4344","citation":{"apa":"Blömer, J., Brauer, S., &#38; Bujna, K. (2018). Coresets for Fuzzy K-Means with Applications. In <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i> (pp. 46:1--46:12). Jiaoxi, Yilan County, Taiwan: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik. <a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">https://doi.org/10.4230/LIPIcs.ISAAC.2018.46</a>","short":"J. Blömer, S. Brauer, K. Bujna, in: 29th International Symposium on Algorithms and Computation  (ISAAC 2018), Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018, pp. 46:1--46:12.","bibtex":"@inproceedings{Blömer_Brauer_Bujna_2018, title={Coresets for Fuzzy K-Means with Applications}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">10.4230/LIPIcs.ISAAC.2018.46</a>}, booktitle={29th International Symposium on Algorithms and Computation  (ISAAC 2018)}, publisher={Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}, author={Blömer, Johannes and Brauer, Sascha and Bujna, Kathrin}, year={2018}, pages={46:1--46:12} }","mla":"Blömer, Johannes, et al. “Coresets for Fuzzy K-Means with Applications.” <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>, Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018, pp. 46:1--46:12, doi:<a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">10.4230/LIPIcs.ISAAC.2018.46</a>.","ama":"Blömer J, Brauer S, Bujna K. Coresets for Fuzzy K-Means with Applications. In: <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik; 2018:46:1--46:12. doi:<a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">10.4230/LIPIcs.ISAAC.2018.46</a>","ieee":"J. Blömer, S. Brauer, and K. Bujna, “Coresets for Fuzzy K-Means with Applications,” in <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>, Jiaoxi, Yilan County, Taiwan, 2018, pp. 46:1--46:12.","chicago":"Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Coresets for Fuzzy K-Means with Applications.” In <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>, 46:1--46:12. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018. <a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">https://doi.org/10.4230/LIPIcs.ISAAC.2018.46</a>."},"page":"46:1--46:12","year":"2018","publication_status":"published","publication_identifier":{"isbn":["978-3-95977-094-1"]},"conference":{"name":"29th International Symposium on Algorithms and Computation (ISAAC)","start_date":"2018-12-17","end_date":"2018-12-19","location":"Jiaoxi, Yilan County, Taiwan"},"doi":"10.4230/LIPIcs.ISAAC.2018.46","title":"Coresets for Fuzzy K-Means with Applications","date_created":"2018-09-03T08:04:19Z","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"last_name":"Brauer","full_name":"Brauer, Sascha","id":"13291","first_name":"Sascha"},{"first_name":"Kathrin","full_name":"Bujna, Kathrin","last_name":"Bujna"}],"date_updated":"2022-01-06T07:00:57Z","publisher":"Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik"},{"title":"Implementierung und Analyse von Searchable Encryption","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_created":"2018-11-08T10:13:08Z","author":[{"first_name":"Oliver","full_name":"von Heißen, Oliver","last_name":"von Heißen"}],"date_updated":"2022-01-06T07:01:53Z","citation":{"chicago":"Heißen, Oliver von. <i>Implementierung und Analyse von Searchable Encryption</i>, 2018.","ieee":"O. von Heißen, <i>Implementierung und Analyse von Searchable Encryption</i>. 2018.","ama":"von Heißen O. <i>Implementierung und Analyse von Searchable Encryption</i>.; 2018.","apa":"von Heißen, O. (2018). <i>Implementierung und Analyse von Searchable Encryption</i>.","bibtex":"@book{von Heißen_2018, title={Implementierung und Analyse von Searchable Encryption}, author={von Heißen, Oliver}, year={2018} }","short":"O. von Heißen, Implementierung und Analyse von Searchable Encryption, 2018.","mla":"von Heißen, Oliver. <i>Implementierung und Analyse von Searchable Encryption</i>. 2018."},"year":"2018","extern":"1","language":[{"iso":"ger"}],"department":[{"_id":"64"}],"user_id":"13703","_id":"5426","status":"public","type":"bachelorsthesis"},{"citation":{"apa":"Juhnke, J. (2018). <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-570\">https://doi.org/10.17619/UNIPB/1-570</a>","short":"J. Juhnke, Models and Constructions for Secure Reputation Systems, Universität Paderborn, 2018.","bibtex":"@book{Juhnke_2018, title={Models and Constructions for Secure Reputation Systems}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-570\">10.17619/UNIPB/1-570</a>}, publisher={Universität Paderborn}, author={Juhnke, Jakob}, year={2018} }","mla":"Juhnke, Jakob. <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn, 2018, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-570\">10.17619/UNIPB/1-570</a>.","ama":"Juhnke J. <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn; 2018. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-570\">10.17619/UNIPB/1-570</a>","ieee":"J. Juhnke, <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn, 2018.","chicago":"Juhnke, Jakob. <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn, 2018. <a href=\"https://doi.org/10.17619/UNIPB/1-570\">https://doi.org/10.17619/UNIPB/1-570</a>."},"year":"2018","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"author":[{"id":"48090","full_name":"Juhnke, Jakob","last_name":"Juhnke","first_name":"Jakob"}],"date_created":"2019-01-10T07:51:07Z","date_updated":"2022-01-06T07:03:13Z","publisher":"Universität Paderborn","doi":"10.17619/UNIPB/1-570","title":"Models and Constructions for Secure Reputation Systems","type":"dissertation","status":"public","user_id":"477","department":[{"_id":"64"}],"project":[{"_id":"13","name":"SFB 901 - Subproject C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"1","name":"SFB 901"}],"_id":"6597","language":[{"iso":"eng"}]},{"series_title":"Lecture Notes in Computer Science","user_id":"25078","department":[{"_id":"64"}],"project":[{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - Subproject C1"},{"_id":"1","name":"SFB 901"}],"_id":"3873","file_date_updated":"2018-11-08T10:15:00Z","type":"conference","status":"public","author":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"},{"id":"25078","full_name":"Eidens, Fabian","last_name":"Eidens","first_name":"Fabian"},{"last_name":"Juhnke","id":"48090","full_name":"Juhnke, Jakob","first_name":"Jakob"}],"volume":11124,"date_updated":"2023-01-10T10:26:13Z","oa":"1","main_file_link":[{"url":"https://eprint.iacr.org/2018/874","open_access":"1"}],"conference":{"location":"Naples, Italy","name":"The International Conference on Cryptology And Network Security (CANS)"},"doi":"10.1007/978-3-030-00434-7_12","publication_status":"published","publication_identifier":{"isbn":["978-3-030-00434-7"]},"has_accepted_license":"1","citation":{"chicago":"Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Enhanced Security of Attribute-Based Signatures.” In <i>The International Conference on Cryptology And Network Security (CANS)</i>, 11124:235–55. Lecture Notes in Computer Science. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">https://doi.org/10.1007/978-3-030-00434-7_12</a>.","ieee":"J. Blömer, F. Eidens, and J. Juhnke, “Enhanced Security of Attribute-Based Signatures,” in <i>The International Conference on Cryptology And Network Security (CANS)</i>, Naples, Italy, 2018, vol. 11124, pp. 235–255, doi: <a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>.","ama":"Blömer J, Eidens F, Juhnke J. Enhanced Security of Attribute-Based Signatures. In: <i>The International Conference on Cryptology And Network Security (CANS)</i>. Vol 11124. Lecture Notes in Computer Science. Springer; 2018:235-255. doi:<a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>","bibtex":"@inproceedings{Blömer_Eidens_Juhnke_2018, series={Lecture Notes in Computer Science}, title={Enhanced Security of Attribute-Based Signatures}, volume={11124}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>}, booktitle={The International Conference on Cryptology And Network Security (CANS)}, publisher={Springer}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={235–255}, collection={Lecture Notes in Computer Science} }","mla":"Blömer, Johannes, et al. “Enhanced Security of Attribute-Based Signatures.” <i>The International Conference on Cryptology And Network Security (CANS)</i>, vol. 11124, Springer, 2018, pp. 235–55, doi:<a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>.","short":"J. Blömer, F. Eidens, J. Juhnke, in: The International Conference on Cryptology And Network Security (CANS), Springer, 2018, pp. 235–255.","apa":"Blömer, J., Eidens, F., &#38; Juhnke, J. (2018). Enhanced Security of Attribute-Based Signatures. <i>The International Conference on Cryptology And Network Security (CANS)</i>, <i>11124</i>, 235–255. <a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">https://doi.org/10.1007/978-3-030-00434-7_12</a>"},"intvolume":"     11124","page":"235-255","language":[{"iso":"eng"}],"ddc":["000"],"publication":"The International Conference on Cryptology And Network Security (CANS)","file":[{"date_updated":"2018-11-08T10:15:00Z","date_created":"2018-11-08T10:15:00Z","creator":"feidens","file_size":574228,"file_name":"uc_abs.pdf","file_id":"5427","access_level":"closed","content_type":"application/pdf","relation":"main_file"}],"date_created":"2018-08-10T09:44:09Z","publisher":"Springer","title":"Enhanced Security of Attribute-Based Signatures","year":"2018"},{"_id":"2379","project":[{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"department":[{"_id":"7"},{"_id":"64"}],"user_id":"25078","series_title":"LNCS","file_date_updated":"2018-11-02T13:41:16Z","type":"conference","status":"public","oa":"1","date_updated":"2023-01-10T10:28:43Z","author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"id":"27207","full_name":"Bobolz, Jan","last_name":"Bobolz","first_name":"Jan"}],"conference":{"name":"The 16th International Conference on Applied Cryptography and Network Security","location":"Leuven, Belgium"},"doi":"10.1007/978-3-319-93387-0_12","main_file_link":[{"url":"https://eprint.iacr.org/2018/340","open_access":"1"}],"has_accepted_license":"1","publication_status":"accepted","citation":{"ama":"Blömer J, Bobolz J. Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. In: <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>. LNCS. doi:<a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>","chicago":"Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” In <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>. LNCS, n.d. <a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">https://doi.org/10.1007/978-3-319-93387-0_12</a>.","ieee":"J. Blömer and J. Bobolz, “Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures,” presented at the The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, doi: <a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>.","apa":"Blömer, J., &#38; Bobolz, J. (n.d.). Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>. The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium. <a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">https://doi.org/10.1007/978-3-319-93387-0_12</a>","mla":"Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>, doi:<a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>.","bibtex":"@inproceedings{Blömer_Bobolz, series={LNCS}, title={Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>}, booktitle={ACNS 2018 Applied Cryptography &#38; Network security}, author={Blömer, Johannes and Bobolz, Jan}, collection={LNCS} }","short":"J. Blömer, J. Bobolz, in: ACNS 2018 Applied Cryptography &#38; Network Security, n.d."},"ddc":["004"],"language":[{"iso":"eng"}],"publication":"ACNS 2018 Applied Cryptography & Network security","abstract":[{"lang":"eng","text":"In this paper, we introduce the notion of delegatable attribute-based anonymous credentials (DAAC). Such systems offer fine-grained anonymous access control and they give the credential holder the ability to issue more restricted credentials to other users. In our model, credentials are parameterized with attributes that (1) express what the credential holder himself has been certified and (2) define which attributes he may issue to others. Furthermore, we present a practical construction of DAAC. For this construction, we deviate from the usual approach of embedding a certificate chain in the credential. Instead, we introduce a novel approach for which we identify a new primitive we call dynamically malleable signatures (DMS) as the main ingredient. This primitive may be of independent interest. We also give a first instantiation of DMS with efficient protocols. "}],"file":[{"file_id":"5252","file_name":"2018-340.pdf","access_level":"closed","file_size":542171,"creator":"ups","date_created":"2018-11-02T13:41:16Z","date_updated":"2018-11-02T13:41:16Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"date_created":"2018-04-17T12:28:25Z","title":"Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures","year":"2018"},{"type":"dissertation","status":"public","_id":"2908","user_id":"25078","department":[{"_id":"64"}],"year":"2017","citation":{"short":"K. Bujna, Soft Clustering Algorithms - Theoretical and Practical Improvements, Universität Paderborn, 2017.","mla":"Bujna, Kathrin. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn, 2017, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-226\">10.17619/UNIPB/1-226</a>.","bibtex":"@book{Bujna_2017, title={Soft Clustering Algorithms - Theoretical and Practical Improvements}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-226\">10.17619/UNIPB/1-226</a>}, publisher={Universität Paderborn}, author={Bujna, Kathrin}, year={2017} }","apa":"Bujna, K. (2017). <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-226\">https://doi.org/10.17619/UNIPB/1-226</a>","ama":"Bujna K. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn; 2017. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-226\">10.17619/UNIPB/1-226</a>","ieee":"K. Bujna, <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn, 2017.","chicago":"Bujna, Kathrin. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn, 2017. <a href=\"https://doi.org/10.17619/UNIPB/1-226\">https://doi.org/10.17619/UNIPB/1-226</a>."},"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:46Z","date_created":"2018-05-25T10:02:30Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"full_name":"Bujna, Kathrin","last_name":"Bujna","first_name":"Kathrin"}],"title":"Soft Clustering Algorithms - Theoretical and Practical Improvements","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-29759"}],"doi":"10.17619/UNIPB/1-226"},{"type":"conference","status":"public","user_id":"477","series_title":"Lecture Notes in Computer Science","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"2967","file_date_updated":"2018-11-02T14:52:10Z","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319724522","9783319724539"]},"has_accepted_license":"1","citation":{"apa":"Blömer, J., &#38; Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>","mla":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>.","bibtex":"@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }","short":"J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.","ieee":"J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2017, vol. 10693, pp. 438–453.","chicago":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>.","ama":"Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>"},"intvolume":"     10693","page":"438-453","place":"Cham","author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Gennadij","full_name":"Liske, Gennadij","last_name":"Liske"}],"volume":10693,"oa":"1","date_updated":"2022-01-06T06:58:49Z","main_file_link":[{"url":"https://eprint.iacr.org/2017/453.pdf","open_access":"1"}],"doi":"10.1007/978-3-319-72453-9_35","publication":"Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)","file":[{"date_updated":"2018-11-02T14:52:10Z","date_created":"2018-11-02T14:52:10Z","creator":"ups","file_size":463904,"access_level":"closed","file_id":"5286","file_name":"SubtletiesInSecurityDefinition.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"language":[{"iso":"eng"}],"ddc":["000"],"year":"2017","date_created":"2018-06-04T12:17:48Z","publisher":"Springer International Publishing","title":"Subtleties in Security Definitions for Predicate Encryption with Public Index"},{"type":"dissertation","status":"public","user_id":"25078","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"116","citation":{"apa":"Liske, G. (2017). <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-220\">https://doi.org/10.17619/UNIPB/1-220</a>","short":"G. Liske, CCA-Security for Predicate Encryption Schemes, Universität Paderborn, 2017.","bibtex":"@book{Liske_2017, title={CCA-Security for Predicate Encryption Schemes}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-220\">10.17619/UNIPB/1-220</a>}, publisher={Universität Paderborn}, author={Liske, Gennadij}, year={2017} }","mla":"Liske, Gennadij. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn, 2017, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-220\">10.17619/UNIPB/1-220</a>.","ieee":"G. Liske, <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn, 2017.","chicago":"Liske, Gennadij. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn, 2017. <a href=\"https://doi.org/10.17619/UNIPB/1-220\">https://doi.org/10.17619/UNIPB/1-220</a>.","ama":"Liske G. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn; 2017. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-220\">10.17619/UNIPB/1-220</a>"},"year":"2017","date_created":"2017-10-17T12:41:14Z","author":[{"last_name":"Liske","full_name":"Liske, Gennadij","first_name":"Gennadij"}],"supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:51:04Z","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-29690"}],"doi":"10.17619/UNIPB/1-220","title":"CCA-Security for Predicate Encryption Schemes"},{"year":"2017","title":"Searchable Encryption with Access Control","date_created":"2018-04-13T11:40:23Z","publisher":"ACM Press","file":[{"file_size":658797,"file_id":"5431","file_name":"searchable_encryption_access_control_website.pdf","access_level":"open_access","date_updated":"2018-11-08T10:56:15Z","date_created":"2018-11-08T10:56:15Z","creator":"nilo","relation":"main_file","content_type":"application/pdf"}],"publication":"Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES '17","language":[{"iso":"eng"}],"ddc":["000"],"citation":{"ama":"Löken N. Searchable Encryption with Access Control. In: <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>. ICPS. ACM Press; 2017. doi:<a href=\"https://doi.org/10.1145/3098954.3098987\">10.1145/3098954.3098987</a>","chicago":"Löken, Nils. “Searchable Encryption with Access Control.” In <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>. ICPS. ACM Press, 2017. <a href=\"https://doi.org/10.1145/3098954.3098987\">https://doi.org/10.1145/3098954.3098987</a>.","ieee":"N. Löken, “Searchable Encryption with Access Control,” in <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>, 2017.","apa":"Löken, N. (2017). Searchable Encryption with Access Control. In <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>. ACM Press. <a href=\"https://doi.org/10.1145/3098954.3098987\">https://doi.org/10.1145/3098954.3098987</a>","short":"N. Löken, in: Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17, ACM Press, 2017.","mla":"Löken, Nils. “Searchable Encryption with Access Control.” <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>, 24, ACM Press, 2017, doi:<a href=\"https://doi.org/10.1145/3098954.3098987\">10.1145/3098954.3098987</a>.","bibtex":"@inproceedings{Löken_2017, series={ICPS}, title={Searchable Encryption with Access Control}, DOI={<a href=\"https://doi.org/10.1145/3098954.3098987\">10.1145/3098954.3098987</a>}, number={24}, booktitle={Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17}, publisher={ACM Press}, author={Löken, Nils}, year={2017}, collection={ICPS} }"},"publication_identifier":{"isbn":["9781450352574"]},"has_accepted_license":"1","publication_status":"published","doi":"10.1145/3098954.3098987","main_file_link":[{"open_access":"1","url":"http://eprint.iacr.org/2017/679"}],"author":[{"last_name":"Löken","id":"13703","full_name":"Löken, Nils","first_name":"Nils"}],"date_updated":"2022-01-06T06:55:54Z","oa":"1","status":"public","type":"conference","file_date_updated":"2018-11-08T10:56:15Z","article_number":"24","department":[{"_id":"64"}],"user_id":"13703","series_title":"ICPS","_id":"2343","project":[{"name":"Securing the Financial Cloud","_id":"43"}]},{"_id":"2344","project":[{"name":"SFB 901 - Subproject C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"1","name":"SFB 901"},{"_id":"43","name":"Securing the Financial Cloud"}],"department":[{"_id":"64"}],"user_id":"13703","file_date_updated":"2018-11-08T09:53:34Z","type":"conference","status":"public","oa":"1","date_updated":"2022-01-06T06:55:55Z","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"full_name":"Günther, Peter","last_name":"Günther","first_name":"Peter"},{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"},{"first_name":"Nils","full_name":"Löken, Nils","id":"13703","last_name":"Löken"}],"doi":"10.1007/978-3-319-75650-9_1","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319756493","9783319756509"]},"has_accepted_license":"1","publication_status":"published","place":"Cham","page":"3-17","citation":{"ama":"Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: <i>Foundations and Practice of Security</i>. Cham: Springer International Publishing; 2017:3-17. doi:<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>","chicago":"Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In <i>Foundations and Practice of Security</i>, 3–17. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">https://doi.org/10.1007/978-3-319-75650-9_1</a>.","ieee":"J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in <i>Foundations and Practice of Security</i>, 2017, pp. 3–17.","mla":"Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” <i>Foundations and Practice of Security</i>, Springer International Publishing, 2017, pp. 3–17, doi:<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>.","short":"J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.","bibtex":"@inproceedings{Blömer_Günther_Krummel_Löken_2017, place={Cham}, title={Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>}, booktitle={Foundations and Practice of Security}, publisher={Springer International Publishing}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker and Löken, Nils}, year={2017}, pages={3–17} }","apa":"Blömer, J., Günther, P., Krummel, V., &#38; Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In <i>Foundations and Practice of Security</i> (pp. 3–17). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">https://doi.org/10.1007/978-3-319-75650-9_1</a>"},"ddc":["000"],"language":[{"iso":"eng"}],"publication":"Foundations and Practice of Security","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"5292","access_level":"closed","file_name":"Attribute-BasedEncryptionAsASe.pdf","file_size":634736,"date_created":"2018-11-02T15:04:13Z","creator":"ups","date_updated":"2018-11-02T15:04:13Z"},{"date_created":"2018-11-08T09:53:34Z","creator":"nilo","date_updated":"2018-11-08T09:53:34Z","access_level":"open_access","file_id":"5425","file_name":"abe_aas.pdf","file_size":522516,"content_type":"application/pdf","relation":"main_file"}],"publisher":"Springer International Publishing","date_created":"2018-04-13T11:40:48Z","title":"Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations","year":"2017"},{"publisher":"Springer International Publishing","date_created":"2018-04-17T12:20:53Z","title":"Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems","year":"2017","language":[{"iso":"eng"}],"publication":"Lecture Notes in Computer Science","abstract":[{"text":"Metric facility location and K-means are well-known problems of combinatorial optimization. Both admit a fairly simple heuristic called single-swap, which adds, drops or swaps open facilities until it reaches a local optimum. For both problems, it is known that this algorithm produces a solution that is at most a constant factor worse than the respective global optimum. In this paper, we show that single-swap applied to the weighted metric uncapacitated facility location and weighted discrete K-means problem is tightly PLS-complete and hence has exponential worst-case running time.","lang":"eng"}],"date_updated":"2022-01-06T06:56:00Z","volume":10236,"author":[{"first_name":"Sascha","id":"13291","full_name":"Brauer, Sascha","last_name":"Brauer"}],"doi":"10.1007/978-3-319-57586-5_11","conference":{"end_date":"2017-05-26","location":"Athens, Greece","name":"10th International Conference on Algorithms and Complexity","start_date":"2017-05-24"},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319575858","9783319575865"]},"publication_status":"published","place":"Cham","page":"116-127","intvolume":"     10236","citation":{"ieee":"S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems,” in <i>Lecture Notes in Computer Science</i>, vol. 10236, D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International Publishing, 2017, pp. 116–127.","chicago":"Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” In <i>Lecture Notes in Computer Science</i>, edited by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">https://doi.org/10.1007/978-3-319-57586-5_11</a>.","ama":"Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. <i>Lecture Notes in Computer Science</i>. Vol 10236. Cham: Springer International Publishing; 2017:116-127. doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">10.1007/978-3-319-57586-5_11</a>","apa":"Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In D. Fotakis, A. Pagourtzis, &#38; V. T. Paschos (Eds.), <i>Lecture Notes in Computer Science</i> (Vol. 10236, pp. 116–127). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">https://doi.org/10.1007/978-3-319-57586-5_11</a>","bibtex":"@inbook{Brauer_2017, place={Cham}, title={Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems}, volume={10236}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">10.1007/978-3-319-57586-5_11</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Brauer, Sascha}, editor={Fotakis, Dimitris and Pagourtzis, Aris and Paschos, Vangelis Th.Editors}, year={2017}, pages={116–127} }","mla":"Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” <i>Lecture Notes in Computer Science</i>, edited by Dimitris Fotakis et al., vol. 10236, Springer International Publishing, 2017, pp. 116–27, doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">10.1007/978-3-319-57586-5_11</a>.","short":"S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127."},"_id":"2381","department":[{"_id":"64"}],"user_id":"13291","type":"book_chapter","editor":[{"first_name":"Dimitris","last_name":"Fotakis","full_name":"Fotakis, Dimitris"},{"first_name":"Aris","full_name":"Pagourtzis, Aris","last_name":"Pagourtzis"},{"first_name":"Vangelis Th.","last_name":"Paschos","full_name":"Paschos, Vangelis Th."}],"status":"public"},{"type":"mastersthesis","status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"60","user_id":"477","department":[{"_id":"64"}],"year":"2017","citation":{"apa":"Niehus, D. (2017). <i>Semantically Secure Attribute-based Searchable Encryption</i>. Universität Paderborn.","bibtex":"@book{Niehus_2017, title={Semantically Secure Attribute-based Searchable Encryption}, publisher={Universität Paderborn}, author={Niehus, David}, year={2017} }","mla":"Niehus, David. <i>Semantically Secure Attribute-Based Searchable Encryption</i>. Universität Paderborn, 2017.","short":"D. Niehus, Semantically Secure Attribute-Based Searchable Encryption, Universität Paderborn, 2017.","ama":"Niehus D. <i>Semantically Secure Attribute-Based Searchable Encryption</i>. Universität Paderborn; 2017.","ieee":"D. Niehus, <i>Semantically Secure Attribute-based Searchable Encryption</i>. Universität Paderborn, 2017.","chicago":"Niehus, David. <i>Semantically Secure Attribute-Based Searchable Encryption</i>. Universität Paderborn, 2017."},"date_updated":"2022-01-06T07:02:49Z","publisher":"Universität Paderborn","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"author":[{"full_name":"Niehus, David","last_name":"Niehus","first_name":"David"}],"date_created":"2017-10-17T12:41:03Z","title":"Semantically Secure Attribute-based Searchable Encryption"},{"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_created":"2017-10-17T12:41:08Z","author":[{"first_name":"Advait","last_name":"Ganesh Athreya","full_name":"Ganesh Athreya, Advait"}],"date_updated":"2022-01-06T07:04:02Z","publisher":"Universität Paderborn","title":"Instantiating a Predicate Encryption Scheme via Pair Encodings","citation":{"ama":"Ganesh Athreya A. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn; 2017.","ieee":"A. Ganesh Athreya, <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn, 2017.","chicago":"Ganesh Athreya, Advait. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn, 2017.","bibtex":"@book{Ganesh Athreya_2017, title={Instantiating a Predicate Encryption Scheme via Pair Encodings}, publisher={Universität Paderborn}, author={Ganesh Athreya, Advait}, year={2017} }","mla":"Ganesh Athreya, Advait. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn, 2017.","short":"A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings, Universität Paderborn, 2017.","apa":"Ganesh Athreya, A. (2017). <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn."},"year":"2017","department":[{"_id":"64"}],"user_id":"477","_id":"88","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"type":"bachelorsthesis","status":"public"},{"title":"Provably Secure Key-Derivation-Functions for Certain Types of Applications","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"first_name":"Mirko","full_name":"Jürgens, Mirko","last_name":"Jürgens"}],"date_created":"2017-10-17T12:41:04Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:03:15Z","citation":{"apa":"Jürgens, M. (2017). <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn.","bibtex":"@book{Jürgens_2017, title={Provably Secure Key-Derivation-Functions for Certain Types of Applications}, publisher={Universität Paderborn}, author={Jürgens, Mirko}, year={2017} }","mla":"Jürgens, Mirko. <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn, 2017.","short":"M. Jürgens, Provably Secure Key-Derivation-Functions for Certain Types of Applications, Universität Paderborn, 2017.","chicago":"Jürgens, Mirko. <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn, 2017.","ieee":"M. Jürgens, <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn, 2017.","ama":"Jürgens M. <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn; 2017."},"year":"2017","user_id":"477","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"67","status":"public","type":"bachelorsthesis"},{"citation":{"chicago":"Diemert, Denis. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn, 2017.","ieee":"D. Diemert, <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn, 2017.","ama":"Diemert D. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn; 2017.","bibtex":"@book{Diemert_2017, title={EAX - An Authenticated Encryption Mode for Block Ciphers}, publisher={Universität Paderborn}, author={Diemert, Denis}, year={2017} }","short":"D. Diemert, EAX - An Authenticated Encryption Mode for Block Ciphers, Universität Paderborn, 2017.","mla":"Diemert, Denis. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn, 2017.","apa":"Diemert, D. (2017). <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn."},"year":"2017","title":"EAX - An Authenticated Encryption Mode for Block Ciphers","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"author":[{"first_name":"Denis","full_name":"Diemert, Denis","last_name":"Diemert"}],"date_created":"2017-10-17T12:41:11Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:50:38Z","status":"public","type":"bachelorsthesis","department":[{"_id":"64"}],"user_id":"477","_id":"104","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}]},{"year":"2017","citation":{"ama":"Bemmann P. <i>Attribute-Based Signatures Using Structure Preserving Signatures</i>. Universität Paderborn; 2017.","ieee":"P. Bemmann, <i>Attribute-based Signatures using Structure Preserving Signatures</i>. Universität Paderborn, 2017.","chicago":"Bemmann, Pascal. <i>Attribute-Based Signatures Using Structure Preserving Signatures</i>. Universität Paderborn, 2017.","apa":"Bemmann, P. (2017). <i>Attribute-based Signatures using Structure Preserving Signatures</i>. Universität Paderborn.","short":"P. Bemmann, Attribute-Based Signatures Using Structure Preserving Signatures, Universität Paderborn, 2017.","bibtex":"@book{Bemmann_2017, title={Attribute-based Signatures using Structure Preserving Signatures}, publisher={Universität Paderborn}, author={Bemmann, Pascal}, year={2017} }","mla":"Bemmann, Pascal. <i>Attribute-Based Signatures Using Structure Preserving Signatures</i>. Universität Paderborn, 2017."},"title":"Attribute-based Signatures using Structure Preserving Signatures","date_updated":"2022-01-06T06:51:06Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:14Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"full_name":"Bemmann, Pascal","id":"32571","last_name":"Bemmann","first_name":"Pascal"}],"status":"public","type":"mastersthesis","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"117","user_id":"25078","department":[{"_id":"64"}]},{"year":"2016","citation":{"ieee":"E. Weis, <i>Searchable Encryption</i>. 2016.","chicago":"Weis, Eduard. <i>Searchable Encryption</i>, 2016.","ama":"Weis E. <i>Searchable Encryption</i>.; 2016.","bibtex":"@book{Weis_2016, title={Searchable Encryption}, author={Weis, Eduard}, year={2016} }","mla":"Weis, Eduard. <i>Searchable Encryption</i>. 2016.","short":"E. Weis, Searchable Encryption, 2016.","apa":"Weis, E. (2016). <i>Searchable Encryption</i>."},"date_updated":"2022-01-06T06:58:42Z","author":[{"first_name":"Eduard","full_name":"Weis, Eduard","last_name":"Weis"}],"date_created":"2018-05-25T09:43:39Z","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"title":"Searchable Encryption","type":"mastersthesis","status":"public","_id":"2898","department":[{"_id":"64"}],"user_id":"25078"},{"project":[{"name":"Securing the Financial Cloud","_id":"43"}],"_id":"2947","user_id":"25078","department":[{"_id":"64"}],"status":"public","type":"conference","publication":"2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)","title":"Singular Curve Point Decompression Attack","doi":"10.1109/fdtc.2015.17","publisher":"IEEE","date_updated":"2022-01-06T06:58:48Z","date_created":"2018-05-29T11:25:43Z","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"first_name":"Peter","last_name":"Günther","full_name":"Günther, Peter"}],"year":"2016","citation":{"bibtex":"@inproceedings{Blömer_Günther_2016, title={Singular Curve Point Decompression Attack}, DOI={<a href=\"https://doi.org/10.1109/fdtc.2015.17\">10.1109/fdtc.2015.17</a>}, booktitle={2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)}, publisher={IEEE}, author={Blömer, Johannes and Günther, Peter}, year={2016} }","mla":"Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.” <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/fdtc.2015.17\">10.1109/fdtc.2015.17</a>.","short":"J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), IEEE, 2016.","apa":"Blömer, J., &#38; Günther, P. (2016). Singular Curve Point Decompression Attack. In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE. <a href=\"https://doi.org/10.1109/fdtc.2015.17\">https://doi.org/10.1109/fdtc.2015.17</a>","ama":"Blömer J, Günther P. Singular Curve Point Decompression Attack. In: <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/fdtc.2015.17\">10.1109/fdtc.2015.17</a>","ieee":"J. Blömer and P. Günther, “Singular Curve Point Decompression Attack,” in <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>, 2016.","chicago":"Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.” In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/fdtc.2015.17\">https://doi.org/10.1109/fdtc.2015.17</a>."},"publication_status":"published","publication_identifier":{"isbn":["9781467375795"]}},{"doi":"10.1007/978-3-319-32859-1_13","title":"Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures","author":[{"first_name":"Peter","full_name":"Günther, Peter","last_name":"Günther"},{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"}],"date_created":"2018-05-29T11:26:56Z","date_updated":"2022-01-06T06:58:48Z","publisher":"Springer International Publishing","page":"151-165","citation":{"apa":"Günther, P., &#38; Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In <i>Mathematical Aspects of Computer and Information Sciences</i> (pp. 151–165). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>","bibtex":"@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>}, booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016}, pages={151–165} }","short":"P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.","mla":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” <i>Mathematical Aspects of Computer and Information Sciences</i>, Springer International Publishing, 2016, pp. 151–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>.","chicago":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” In <i>Mathematical Aspects of Computer and Information Sciences</i>, 151–65. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>.","ieee":"P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in <i>Mathematical Aspects of Computer and Information Sciences</i>, Cham: Springer International Publishing, 2016, pp. 151–165.","ama":"Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: <i>Mathematical Aspects of Computer and Information Sciences</i>. Cham: Springer International Publishing; 2016:151-165. doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>"},"year":"2016","place":"Cham","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319328584","9783319328591"]},"publication_status":"published","department":[{"_id":"64"}],"user_id":"25078","_id":"2948","project":[{"_id":"43","name":"Securing the Financial Cloud"}],"status":"public","publication":"Mathematical Aspects of Computer and Information Sciences","type":"book_chapter"},{"title":"Theoretical Analysis of the k-Means Algorithm – A Survey","doi":"10.1007/978-3-319-49487-6_3","publisher":"Springer International Publishing","date_updated":"2022-01-06T06:58:49Z","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"full_name":"Lammersen, Christiane","last_name":"Lammersen","first_name":"Christiane"},{"first_name":"Melanie","full_name":"Schmidt, Melanie","last_name":"Schmidt"},{"full_name":"Sohler, Christian","last_name":"Sohler","first_name":"Christian"}],"date_created":"2018-06-04T12:22:40Z","place":"Cham","year":"2016","citation":{"bibtex":"@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical Analysis of the k-Means Algorithm – A Survey}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>}, booktitle={Algorithm Engineering}, publisher={Springer International Publishing}, author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}, year={2016}, pages={81–116} }","mla":"Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016, pp. 81–116, doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>.","short":"J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.","apa":"Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i> (pp. 81–116). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>","ieee":"J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer International Publishing, 2016, pp. 81–116.","chicago":"Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>.","ama":"Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International Publishing; 2016:81-116. doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>"},"page":"81-116","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319494869","9783319494876"]},"_id":"2968","user_id":"25078","department":[{"_id":"64"}],"status":"public","type":"book_chapter","publication":"Algorithm Engineering"}]
