---
_id: '4344'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Sascha
  full_name: Brauer, Sascha
  id: '13291'
  last_name: Brauer
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: 'Blömer J, Brauer S, Bujna K. Coresets for Fuzzy K-Means with Applications.
    In: <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>.
    Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik; 2018:46:1--46:12. doi:<a href="https://doi.org/10.4230/LIPIcs.ISAAC.2018.46">10.4230/LIPIcs.ISAAC.2018.46</a>'
  apa: 'Blömer, J., Brauer, S., &#38; Bujna, K. (2018). Coresets for Fuzzy K-Means
    with Applications. In <i>29th International Symposium on Algorithms and Computation 
    (ISAAC 2018)</i> (pp. 46:1--46:12). Jiaoxi, Yilan County, Taiwan: Schloss Dagstuhl--Leibniz-Zentrum
    fuer Informatik. <a href="https://doi.org/10.4230/LIPIcs.ISAAC.2018.46">https://doi.org/10.4230/LIPIcs.ISAAC.2018.46</a>'
  bibtex: '@inproceedings{Blömer_Brauer_Bujna_2018, title={Coresets for Fuzzy K-Means
    with Applications}, DOI={<a href="https://doi.org/10.4230/LIPIcs.ISAAC.2018.46">10.4230/LIPIcs.ISAAC.2018.46</a>},
    booktitle={29th International Symposium on Algorithms and Computation  (ISAAC
    2018)}, publisher={Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}, author={Blömer,
    Johannes and Brauer, Sascha and Bujna, Kathrin}, year={2018}, pages={46:1--46:12}
    }'
  chicago: Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Coresets for Fuzzy
    K-Means with Applications.” In <i>29th International Symposium on Algorithms and
    Computation  (ISAAC 2018)</i>, 46:1--46:12. Schloss Dagstuhl--Leibniz-Zentrum
    fuer Informatik, 2018. <a href="https://doi.org/10.4230/LIPIcs.ISAAC.2018.46">https://doi.org/10.4230/LIPIcs.ISAAC.2018.46</a>.
  ieee: J. Blömer, S. Brauer, and K. Bujna, “Coresets for Fuzzy K-Means with Applications,”
    in <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>,
    Jiaoxi, Yilan County, Taiwan, 2018, pp. 46:1--46:12.
  mla: Blömer, Johannes, et al. “Coresets for Fuzzy K-Means with Applications.” <i>29th
    International Symposium on Algorithms and Computation  (ISAAC 2018)</i>, Schloss
    Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018, pp. 46:1--46:12, doi:<a href="https://doi.org/10.4230/LIPIcs.ISAAC.2018.46">10.4230/LIPIcs.ISAAC.2018.46</a>.
  short: 'J. Blömer, S. Brauer, K. Bujna, in: 29th International Symposium on Algorithms
    and Computation  (ISAAC 2018), Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik,
    2018, pp. 46:1--46:12.'
conference:
  end_date: 2018-12-19
  location: Jiaoxi, Yilan County, Taiwan
  name: 29th International Symposium on Algorithms and Computation (ISAAC)
  start_date: 2018-12-17
date_created: 2018-09-03T08:04:19Z
date_updated: 2022-01-06T07:00:57Z
department:
- _id: '64'
doi: 10.4230/LIPIcs.ISAAC.2018.46
language:
- iso: eng
page: 46:1--46:12
project:
- _id: '45'
  name: Soft-Clustering - Von Heuristiken zu Approximationsalgorithmen
publication: 29th International Symposium on Algorithms and Computation  (ISAAC 2018)
publication_identifier:
  isbn:
  - 978-3-95977-094-1
publication_status: published
publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
status: public
title: Coresets for Fuzzy K-Means with Applications
type: conference
user_id: '13291'
year: '2018'
...
---
_id: '5426'
author:
- first_name: Oliver
  full_name: von Heißen, Oliver
  last_name: von Heißen
citation:
  ama: von Heißen O. <i>Implementierung und Analyse von Searchable Encryption</i>.;
    2018.
  apa: von Heißen, O. (2018). <i>Implementierung und Analyse von Searchable Encryption</i>.
  bibtex: '@book{von Heißen_2018, title={Implementierung und Analyse von Searchable
    Encryption}, author={von Heißen, Oliver}, year={2018} }'
  chicago: Heißen, Oliver von. <i>Implementierung und Analyse von Searchable Encryption</i>,
    2018.
  ieee: O. von Heißen, <i>Implementierung und Analyse von Searchable Encryption</i>.
    2018.
  mla: von Heißen, Oliver. <i>Implementierung und Analyse von Searchable Encryption</i>.
    2018.
  short: O. von Heißen, Implementierung und Analyse von Searchable Encryption, 2018.
date_created: 2018-11-08T10:13:08Z
date_updated: 2022-01-06T07:01:53Z
department:
- _id: '64'
extern: '1'
language:
- iso: ger
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Implementierung und Analyse von Searchable Encryption
type: bachelorsthesis
user_id: '13703'
year: '2018'
...
---
_id: '6597'
author:
- first_name: Jakob
  full_name: Juhnke, Jakob
  id: '48090'
  last_name: Juhnke
citation:
  ama: Juhnke J. <i>Models and Constructions for Secure Reputation Systems</i>. Universität
    Paderborn; 2018. doi:<a href="https://doi.org/10.17619/UNIPB/1-570">10.17619/UNIPB/1-570</a>
  apa: Juhnke, J. (2018). <i>Models and Constructions for Secure Reputation Systems</i>.
    Universität Paderborn. <a href="https://doi.org/10.17619/UNIPB/1-570">https://doi.org/10.17619/UNIPB/1-570</a>
  bibtex: '@book{Juhnke_2018, title={Models and Constructions for Secure Reputation
    Systems}, DOI={<a href="https://doi.org/10.17619/UNIPB/1-570">10.17619/UNIPB/1-570</a>},
    publisher={Universität Paderborn}, author={Juhnke, Jakob}, year={2018} }'
  chicago: Juhnke, Jakob. <i>Models and Constructions for Secure Reputation Systems</i>.
    Universität Paderborn, 2018. <a href="https://doi.org/10.17619/UNIPB/1-570">https://doi.org/10.17619/UNIPB/1-570</a>.
  ieee: J. Juhnke, <i>Models and Constructions for Secure Reputation Systems</i>.
    Universität Paderborn, 2018.
  mla: Juhnke, Jakob. <i>Models and Constructions for Secure Reputation Systems</i>.
    Universität Paderborn, 2018, doi:<a href="https://doi.org/10.17619/UNIPB/1-570">10.17619/UNIPB/1-570</a>.
  short: J. Juhnke, Models and Constructions for Secure Reputation Systems, Universität
    Paderborn, 2018.
date_created: 2019-01-10T07:51:07Z
date_updated: 2022-01-06T07:03:13Z
department:
- _id: '64'
doi: 10.17619/UNIPB/1-570
language:
- iso: eng
project:
- _id: '13'
  name: SFB 901 - Subproject C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '1'
  name: SFB 901
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Models and Constructions for Secure Reputation Systems
type: dissertation
user_id: '477'
year: '2018'
...
---
_id: '3873'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Fabian
  full_name: Eidens, Fabian
  id: '25078'
  last_name: Eidens
- first_name: Jakob
  full_name: Juhnke, Jakob
  id: '48090'
  last_name: Juhnke
citation:
  ama: 'Blömer J, Eidens F, Juhnke J. Enhanced Security of Attribute-Based Signatures.
    In: <i>The International Conference on Cryptology And Network Security (CANS)</i>.
    Vol 11124. Lecture Notes in Computer Science. Springer; 2018:235-255. doi:<a href="https://doi.org/10.1007/978-3-030-00434-7_12">10.1007/978-3-030-00434-7_12</a>'
  apa: Blömer, J., Eidens, F., &#38; Juhnke, J. (2018). Enhanced Security of Attribute-Based
    Signatures. <i>The International Conference on Cryptology And Network Security
    (CANS)</i>, <i>11124</i>, 235–255. <a href="https://doi.org/10.1007/978-3-030-00434-7_12">https://doi.org/10.1007/978-3-030-00434-7_12</a>
  bibtex: '@inproceedings{Blömer_Eidens_Juhnke_2018, series={Lecture Notes in Computer
    Science}, title={Enhanced Security of Attribute-Based Signatures}, volume={11124},
    DOI={<a href="https://doi.org/10.1007/978-3-030-00434-7_12">10.1007/978-3-030-00434-7_12</a>},
    booktitle={The International Conference on Cryptology And Network Security (CANS)},
    publisher={Springer}, author={Blömer, Johannes and Eidens, Fabian and Juhnke,
    Jakob}, year={2018}, pages={235–255}, collection={Lecture Notes in Computer Science}
    }'
  chicago: Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Enhanced Security of
    Attribute-Based Signatures.” In <i>The International Conference on Cryptology
    And Network Security (CANS)</i>, 11124:235–55. Lecture Notes in Computer Science.
    Springer, 2018. <a href="https://doi.org/10.1007/978-3-030-00434-7_12">https://doi.org/10.1007/978-3-030-00434-7_12</a>.
  ieee: 'J. Blömer, F. Eidens, and J. Juhnke, “Enhanced Security of Attribute-Based
    Signatures,” in <i>The International Conference on Cryptology And Network Security
    (CANS)</i>, Naples, Italy, 2018, vol. 11124, pp. 235–255, doi: <a href="https://doi.org/10.1007/978-3-030-00434-7_12">10.1007/978-3-030-00434-7_12</a>.'
  mla: Blömer, Johannes, et al. “Enhanced Security of Attribute-Based Signatures.”
    <i>The International Conference on Cryptology And Network Security (CANS)</i>,
    vol. 11124, Springer, 2018, pp. 235–55, doi:<a href="https://doi.org/10.1007/978-3-030-00434-7_12">10.1007/978-3-030-00434-7_12</a>.
  short: 'J. Blömer, F. Eidens, J. Juhnke, in: The International Conference on Cryptology
    And Network Security (CANS), Springer, 2018, pp. 235–255.'
conference:
  location: Naples, Italy
  name: The International Conference on Cryptology And Network Security (CANS)
date_created: 2018-08-10T09:44:09Z
date_updated: 2023-01-10T10:26:13Z
ddc:
- '000'
department:
- _id: '64'
doi: 10.1007/978-3-030-00434-7_12
file:
- access_level: closed
  content_type: application/pdf
  creator: feidens
  date_created: 2018-11-08T10:15:00Z
  date_updated: 2018-11-08T10:15:00Z
  file_id: '5427'
  file_name: uc_abs.pdf
  file_size: 574228
  relation: main_file
file_date_updated: 2018-11-08T10:15:00Z
has_accepted_license: '1'
intvolume: '     11124'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2018/874
oa: '1'
page: 235-255
project:
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '13'
  name: SFB 901 - Subproject C1
- _id: '1'
  name: SFB 901
publication: The International Conference on Cryptology And Network Security (CANS)
publication_identifier:
  isbn:
  - 978-3-030-00434-7
publication_status: published
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: Enhanced Security of Attribute-Based Signatures
type: conference
user_id: '25078'
volume: 11124
year: '2018'
...
---
_id: '2379'
abstract:
- lang: eng
  text: 'In this paper, we introduce the notion of delegatable attribute-based anonymous
    credentials (DAAC). Such systems offer fine-grained anonymous access control and
    they give the credential holder the ability to issue more restricted credentials
    to other users. In our model, credentials are parameterized with attributes that
    (1) express what the credential holder himself has been certified and (2) define
    which attributes he may issue to others. Furthermore, we present a practical construction
    of DAAC. For this construction, we deviate from the usual approach of embedding
    a certificate chain in the credential. Instead, we introduce a novel approach
    for which we identify a new primitive we call dynamically malleable signatures
    (DMS) as the main ingredient. This primitive may be of independent interest. We
    also give a first instantiation of DMS with efficient protocols. '
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Jan
  full_name: Bobolz, Jan
  id: '27207'
  last_name: Bobolz
citation:
  ama: 'Blömer J, Bobolz J. Delegatable Attribute-based Anonymous Credentials from
    Dynamically Malleable Signatures. In: <i>ACNS 2018 Applied Cryptography &#38;
    Network Security</i>. LNCS. doi:<a href="https://doi.org/10.1007/978-3-319-93387-0_12">10.1007/978-3-319-93387-0_12</a>'
  apa: Blömer, J., &#38; Bobolz, J. (n.d.). Delegatable Attribute-based Anonymous
    Credentials from Dynamically Malleable Signatures. <i>ACNS 2018 Applied Cryptography
    &#38; Network Security</i>. The 16th International Conference on Applied Cryptography
    and Network Security, Leuven, Belgium. <a href="https://doi.org/10.1007/978-3-319-93387-0_12">https://doi.org/10.1007/978-3-319-93387-0_12</a>
  bibtex: '@inproceedings{Blömer_Bobolz, series={LNCS}, title={Delegatable Attribute-based
    Anonymous Credentials from Dynamically Malleable Signatures}, DOI={<a href="https://doi.org/10.1007/978-3-319-93387-0_12">10.1007/978-3-319-93387-0_12</a>},
    booktitle={ACNS 2018 Applied Cryptography &#38; Network security}, author={Blömer,
    Johannes and Bobolz, Jan}, collection={LNCS} }'
  chicago: Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous
    Credentials from Dynamically Malleable Signatures.” In <i>ACNS 2018 Applied Cryptography
    &#38; Network Security</i>. LNCS, n.d. <a href="https://doi.org/10.1007/978-3-319-93387-0_12">https://doi.org/10.1007/978-3-319-93387-0_12</a>.
  ieee: 'J. Blömer and J. Bobolz, “Delegatable Attribute-based Anonymous Credentials
    from Dynamically Malleable Signatures,” presented at the The 16th International
    Conference on Applied Cryptography and Network Security, Leuven, Belgium, doi:
    <a href="https://doi.org/10.1007/978-3-319-93387-0_12">10.1007/978-3-319-93387-0_12</a>.'
  mla: Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials
    from Dynamically Malleable Signatures.” <i>ACNS 2018 Applied Cryptography &#38;
    Network Security</i>, doi:<a href="https://doi.org/10.1007/978-3-319-93387-0_12">10.1007/978-3-319-93387-0_12</a>.
  short: 'J. Blömer, J. Bobolz, in: ACNS 2018 Applied Cryptography &#38; Network Security,
    n.d.'
conference:
  location: Leuven, Belgium
  name: The 16th International Conference on Applied Cryptography and Network Security
date_created: 2018-04-17T12:28:25Z
date_updated: 2023-01-10T10:28:43Z
ddc:
- '004'
department:
- _id: '7'
- _id: '64'
doi: 10.1007/978-3-319-93387-0_12
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T13:41:16Z
  date_updated: 2018-11-02T13:41:16Z
  file_id: '5252'
  file_name: 2018-340.pdf
  file_size: 542171
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T13:41:16Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2018/340
oa: '1'
project:
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subproject C1
publication: ACNS 2018 Applied Cryptography & Network security
publication_status: accepted
series_title: LNCS
status: public
title: Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable
  Signatures
type: conference
user_id: '25078'
year: '2018'
...
---
_id: '2908'
author:
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: Bujna K. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>.
    Universität Paderborn; 2017. doi:<a href="https://doi.org/10.17619/UNIPB/1-226">10.17619/UNIPB/1-226</a>
  apa: Bujna, K. (2017). <i>Soft Clustering Algorithms - Theoretical and Practical
    Improvements</i>. Universität Paderborn. <a href="https://doi.org/10.17619/UNIPB/1-226">https://doi.org/10.17619/UNIPB/1-226</a>
  bibtex: '@book{Bujna_2017, title={Soft Clustering Algorithms - Theoretical and Practical
    Improvements}, DOI={<a href="https://doi.org/10.17619/UNIPB/1-226">10.17619/UNIPB/1-226</a>},
    publisher={Universität Paderborn}, author={Bujna, Kathrin}, year={2017} }'
  chicago: Bujna, Kathrin. <i>Soft Clustering Algorithms - Theoretical and Practical
    Improvements</i>. Universität Paderborn, 2017. <a href="https://doi.org/10.17619/UNIPB/1-226">https://doi.org/10.17619/UNIPB/1-226</a>.
  ieee: K. Bujna, <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>.
    Universität Paderborn, 2017.
  mla: Bujna, Kathrin. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>.
    Universität Paderborn, 2017, doi:<a href="https://doi.org/10.17619/UNIPB/1-226">10.17619/UNIPB/1-226</a>.
  short: K. Bujna, Soft Clustering Algorithms - Theoretical and Practical Improvements,
    Universität Paderborn, 2017.
date_created: 2018-05-25T10:02:30Z
date_updated: 2022-01-06T06:58:46Z
department:
- _id: '64'
doi: 10.17619/UNIPB/1-226
main_file_link:
- url: http://nbn-resolving.de/urn:nbn:de:hbz:466:2-29759
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Soft Clustering Algorithms - Theoretical and Practical Improvements
type: dissertation
user_id: '25078'
year: '2017'
...
---
_id: '2967'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: 'Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption
    with Public Index. In: <i>Proceedings of the International Conference of Mathematical
    Aspects of Computer and Information Sciences (MACIS)</i>. Vol 10693. Lecture Notes
    in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:<a
    href="https://doi.org/10.1007/978-3-319-72453-9_35">10.1007/978-3-319-72453-9_35</a>'
  apa: 'Blömer, J., &#38; Liske, G. (2017). Subtleties in Security Definitions for
    Predicate Encryption with Public Index. In <i>Proceedings of the International
    Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>
    (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-72453-9_35">https://doi.org/10.1007/978-3-319-72453-9_35</a>'
  bibtex: '@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in
    Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption
    with Public Index}, volume={10693}, DOI={<a href="https://doi.org/10.1007/978-3-319-72453-9_35">10.1007/978-3-319-72453-9_35</a>},
    booktitle={Proceedings of the International Conference of Mathematical Aspects
    of Computer and Information Sciences (MACIS)}, publisher={Springer International
    Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453},
    collection={Lecture Notes in Computer Science} }'
  chicago: 'Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions
    for Predicate Encryption with Public Index.” In <i>Proceedings of the International
    Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>,
    10693:438–53. Lecture Notes in Computer Science. Cham: Springer International
    Publishing, 2017. <a href="https://doi.org/10.1007/978-3-319-72453-9_35">https://doi.org/10.1007/978-3-319-72453-9_35</a>.'
  ieee: J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate
    Encryption with Public Index,” in <i>Proceedings of the International Conference
    of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2017,
    vol. 10693, pp. 438–453.
  mla: Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for
    Predicate Encryption with Public Index.” <i>Proceedings of the International Conference
    of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, vol.
    10693, Springer International Publishing, 2017, pp. 438–53, doi:<a href="https://doi.org/10.1007/978-3-319-72453-9_35">10.1007/978-3-319-72453-9_35</a>.
  short: 'J. Blömer, G. Liske, in: Proceedings of the International Conference of
    Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International
    Publishing, Cham, 2017, pp. 438–453.'
date_created: 2018-06-04T12:17:48Z
date_updated: 2022-01-06T06:58:49Z
ddc:
- '000'
department:
- _id: '64'
doi: 10.1007/978-3-319-72453-9_35
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T14:52:10Z
  date_updated: 2018-11-02T14:52:10Z
  file_id: '5286'
  file_name: SubtletiesInSecurityDefinition.pdf
  file_size: 463904
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T14:52:10Z
has_accepted_license: '1'
intvolume: '     10693'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2017/453.pdf
oa: '1'
page: 438-453
place: Cham
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '13'
  name: SFB 901 - Subproject C1
publication: Proceedings of the International Conference of Mathematical Aspects of
  Computer and Information Sciences (MACIS)
publication_identifier:
  isbn:
  - '9783319724522'
  - '9783319724539'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: Subtleties in Security Definitions for Predicate Encryption with Public Index
type: conference
user_id: '477'
volume: 10693
year: '2017'
...
---
_id: '116'
author:
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: Liske G. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität
    Paderborn; 2017. doi:<a href="https://doi.org/10.17619/UNIPB/1-220">10.17619/UNIPB/1-220</a>
  apa: Liske, G. (2017). <i>CCA-Security for Predicate Encryption Schemes</i>. Universität
    Paderborn. <a href="https://doi.org/10.17619/UNIPB/1-220">https://doi.org/10.17619/UNIPB/1-220</a>
  bibtex: '@book{Liske_2017, title={CCA-Security for Predicate Encryption Schemes},
    DOI={<a href="https://doi.org/10.17619/UNIPB/1-220">10.17619/UNIPB/1-220</a>},
    publisher={Universität Paderborn}, author={Liske, Gennadij}, year={2017} }'
  chicago: Liske, Gennadij. <i>CCA-Security for Predicate Encryption Schemes</i>.
    Universität Paderborn, 2017. <a href="https://doi.org/10.17619/UNIPB/1-220">https://doi.org/10.17619/UNIPB/1-220</a>.
  ieee: G. Liske, <i>CCA-Security for Predicate Encryption Schemes</i>. Universität
    Paderborn, 2017.
  mla: Liske, Gennadij. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität
    Paderborn, 2017, doi:<a href="https://doi.org/10.17619/UNIPB/1-220">10.17619/UNIPB/1-220</a>.
  short: G. Liske, CCA-Security for Predicate Encryption Schemes, Universität Paderborn,
    2017.
date_created: 2017-10-17T12:41:14Z
date_updated: 2022-01-06T06:51:04Z
department:
- _id: '64'
doi: 10.17619/UNIPB/1-220
main_file_link:
- url: http://nbn-resolving.de/urn:nbn:de:hbz:466:2-29690
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: CCA-Security for Predicate Encryption Schemes
type: dissertation
user_id: '25078'
year: '2017'
...
---
_id: '2343'
article_number: '24'
author:
- first_name: Nils
  full_name: Löken, Nils
  id: '13703'
  last_name: Löken
citation:
  ama: 'Löken N. Searchable Encryption with Access Control. In: <i>Proceedings of
    the 12th International Conference on Availability, Reliability and Security  -
    ARES ’17</i>. ICPS. ACM Press; 2017. doi:<a href="https://doi.org/10.1145/3098954.3098987">10.1145/3098954.3098987</a>'
  apa: Löken, N. (2017). Searchable Encryption with Access Control. In <i>Proceedings
    of the 12th International Conference on Availability, Reliability and Security 
    - ARES ’17</i>. ACM Press. <a href="https://doi.org/10.1145/3098954.3098987">https://doi.org/10.1145/3098954.3098987</a>
  bibtex: '@inproceedings{Löken_2017, series={ICPS}, title={Searchable Encryption
    with Access Control}, DOI={<a href="https://doi.org/10.1145/3098954.3098987">10.1145/3098954.3098987</a>},
    number={24}, booktitle={Proceedings of the 12th International Conference on Availability,
    Reliability and Security  - ARES ’17}, publisher={ACM Press}, author={Löken, Nils},
    year={2017}, collection={ICPS} }'
  chicago: Löken, Nils. “Searchable Encryption with Access Control.” In <i>Proceedings
    of the 12th International Conference on Availability, Reliability and Security 
    - ARES ’17</i>. ICPS. ACM Press, 2017. <a href="https://doi.org/10.1145/3098954.3098987">https://doi.org/10.1145/3098954.3098987</a>.
  ieee: N. Löken, “Searchable Encryption with Access Control,” in <i>Proceedings of
    the 12th International Conference on Availability, Reliability and Security  -
    ARES ’17</i>, 2017.
  mla: Löken, Nils. “Searchable Encryption with Access Control.” <i>Proceedings of
    the 12th International Conference on Availability, Reliability and Security  -
    ARES ’17</i>, 24, ACM Press, 2017, doi:<a href="https://doi.org/10.1145/3098954.3098987">10.1145/3098954.3098987</a>.
  short: 'N. Löken, in: Proceedings of the 12th International Conference on Availability,
    Reliability and Security  - ARES ’17, ACM Press, 2017.'
date_created: 2018-04-13T11:40:23Z
date_updated: 2022-01-06T06:55:54Z
ddc:
- '000'
department:
- _id: '64'
doi: 10.1145/3098954.3098987
file:
- access_level: open_access
  content_type: application/pdf
  creator: nilo
  date_created: 2018-11-08T10:56:15Z
  date_updated: 2018-11-08T10:56:15Z
  file_id: '5431'
  file_name: searchable_encryption_access_control_website.pdf
  file_size: 658797
  relation: main_file
file_date_updated: 2018-11-08T10:56:15Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://eprint.iacr.org/2017/679
oa: '1'
project:
- _id: '43'
  name: Securing the Financial Cloud
publication: Proceedings of the 12th International Conference on Availability, Reliability
  and Security  - ARES '17
publication_identifier:
  isbn:
  - '9781450352574'
publication_status: published
publisher: ACM Press
series_title: ICPS
status: public
title: Searchable Encryption with Access Control
type: conference
user_id: '13703'
year: '2017'
...
---
_id: '2344'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
- first_name: Nils
  full_name: Löken, Nils
  id: '13703'
  last_name: Löken
citation:
  ama: 'Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service
    for Access Control in Large-Scale Organizations. In: <i>Foundations and Practice
    of Security</i>. Cham: Springer International Publishing; 2017:3-17. doi:<a href="https://doi.org/10.1007/978-3-319-75650-9_1">10.1007/978-3-319-75650-9_1</a>'
  apa: 'Blömer, J., Günther, P., Krummel, V., &#38; Löken, N. (2017). Attribute-Based
    Encryption as a Service for Access Control in Large-Scale Organizations. In <i>Foundations
    and Practice of Security</i> (pp. 3–17). Cham: Springer International Publishing.
    <a href="https://doi.org/10.1007/978-3-319-75650-9_1">https://doi.org/10.1007/978-3-319-75650-9_1</a>'
  bibtex: '@inproceedings{Blömer_Günther_Krummel_Löken_2017, place={Cham}, title={Attribute-Based
    Encryption as a Service for Access Control in Large-Scale Organizations}, DOI={<a
    href="https://doi.org/10.1007/978-3-319-75650-9_1">10.1007/978-3-319-75650-9_1</a>},
    booktitle={Foundations and Practice of Security}, publisher={Springer International
    Publishing}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker and
    Löken, Nils}, year={2017}, pages={3–17} }'
  chicago: 'Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based
    Encryption as a Service for Access Control in Large-Scale Organizations.” In <i>Foundations
    and Practice of Security</i>, 3–17. Cham: Springer International Publishing, 2017.
    <a href="https://doi.org/10.1007/978-3-319-75650-9_1">https://doi.org/10.1007/978-3-319-75650-9_1</a>.'
  ieee: J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption
    as a Service for Access Control in Large-Scale Organizations,” in <i>Foundations
    and Practice of Security</i>, 2017, pp. 3–17.
  mla: Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access
    Control in Large-Scale Organizations.” <i>Foundations and Practice of Security</i>,
    Springer International Publishing, 2017, pp. 3–17, doi:<a href="https://doi.org/10.1007/978-3-319-75650-9_1">10.1007/978-3-319-75650-9_1</a>.
  short: 'J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice
    of Security, Springer International Publishing, Cham, 2017, pp. 3–17.'
date_created: 2018-04-13T11:40:48Z
date_updated: 2022-01-06T06:55:55Z
ddc:
- '000'
department:
- _id: '64'
doi: 10.1007/978-3-319-75650-9_1
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T15:04:13Z
  date_updated: 2018-11-02T15:04:13Z
  file_id: '5292'
  file_name: Attribute-BasedEncryptionAsASe.pdf
  file_size: 634736
  relation: main_file
  success: 1
- access_level: open_access
  content_type: application/pdf
  creator: nilo
  date_created: 2018-11-08T09:53:34Z
  date_updated: 2018-11-08T09:53:34Z
  file_id: '5425'
  file_name: abe_aas.pdf
  file_size: 522516
  relation: main_file
file_date_updated: 2018-11-08T09:53:34Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
page: 3-17
place: Cham
project:
- _id: '13'
  name: SFB 901 - Subproject C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '1'
  name: SFB 901
- _id: '43'
  name: Securing the Financial Cloud
publication: Foundations and Practice of Security
publication_identifier:
  isbn:
  - '9783319756493'
  - '9783319756509'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations
type: conference
user_id: '13703'
year: '2017'
...
---
_id: '2381'
abstract:
- lang: eng
  text: Metric facility location and K-means are well-known problems of combinatorial
    optimization. Both admit a fairly simple heuristic called single-swap, which adds,
    drops or swaps open facilities until it reaches a local optimum. For both problems,
    it is known that this algorithm produces a solution that is at most a constant
    factor worse than the respective global optimum. In this paper, we show that single-swap
    applied to the weighted metric uncapacitated facility location and weighted discrete
    K-means problem is tightly PLS-complete and hence has exponential worst-case running
    time.
author:
- first_name: Sascha
  full_name: Brauer, Sascha
  id: '13291'
  last_name: Brauer
citation:
  ama: 'Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location
    and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. <i>Lecture
    Notes in Computer Science</i>. Vol 10236. Cham: Springer International Publishing;
    2017:116-127. doi:<a href="https://doi.org/10.1007/978-3-319-57586-5_11">10.1007/978-3-319-57586-5_11</a>'
  apa: 'Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility
    Location and Related Problems. In D. Fotakis, A. Pagourtzis, &#38; V. T. Paschos
    (Eds.), <i>Lecture Notes in Computer Science</i> (Vol. 10236, pp. 116–127). Cham:
    Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-57586-5_11">https://doi.org/10.1007/978-3-319-57586-5_11</a>'
  bibtex: '@inbook{Brauer_2017, place={Cham}, title={Complexity of Single-Swap Heuristics
    for Metric Facility Location and Related Problems}, volume={10236}, DOI={<a href="https://doi.org/10.1007/978-3-319-57586-5_11">10.1007/978-3-319-57586-5_11</a>},
    booktitle={Lecture Notes in Computer Science}, publisher={Springer International
    Publishing}, author={Brauer, Sascha}, editor={Fotakis, Dimitris and Pagourtzis,
    Aris and Paschos, Vangelis Th.Editors}, year={2017}, pages={116–127} }'
  chicago: 'Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility
    Location and Related Problems.” In <i>Lecture Notes in Computer Science</i>, edited
    by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27.
    Cham: Springer International Publishing, 2017. <a href="https://doi.org/10.1007/978-3-319-57586-5_11">https://doi.org/10.1007/978-3-319-57586-5_11</a>.'
  ieee: 'S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location
    and Related Problems,” in <i>Lecture Notes in Computer Science</i>, vol. 10236,
    D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International
    Publishing, 2017, pp. 116–127.'
  mla: Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location
    and Related Problems.” <i>Lecture Notes in Computer Science</i>, edited by Dimitris
    Fotakis et al., vol. 10236, Springer International Publishing, 2017, pp. 116–27,
    doi:<a href="https://doi.org/10.1007/978-3-319-57586-5_11">10.1007/978-3-319-57586-5_11</a>.
  short: 'S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes
    in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127.'
conference:
  end_date: 2017-05-26
  location: Athens, Greece
  name: 10th International Conference on Algorithms and Complexity
  start_date: 2017-05-24
date_created: 2018-04-17T12:20:53Z
date_updated: 2022-01-06T06:56:00Z
department:
- _id: '64'
doi: 10.1007/978-3-319-57586-5_11
editor:
- first_name: Dimitris
  full_name: Fotakis, Dimitris
  last_name: Fotakis
- first_name: Aris
  full_name: Pagourtzis, Aris
  last_name: Pagourtzis
- first_name: Vangelis Th.
  full_name: Paschos, Vangelis Th.
  last_name: Paschos
intvolume: '     10236'
language:
- iso: eng
page: 116-127
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783319575858'
  - '9783319575865'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Complexity of Single-Swap Heuristics for Metric Facility Location and Related
  Problems
type: book_chapter
user_id: '13291'
volume: 10236
year: '2017'
...
---
_id: '60'
author:
- first_name: David
  full_name: Niehus, David
  last_name: Niehus
citation:
  ama: Niehus D. <i>Semantically Secure Attribute-Based Searchable Encryption</i>.
    Universität Paderborn; 2017.
  apa: Niehus, D. (2017). <i>Semantically Secure Attribute-based Searchable Encryption</i>.
    Universität Paderborn.
  bibtex: '@book{Niehus_2017, title={Semantically Secure Attribute-based Searchable
    Encryption}, publisher={Universität Paderborn}, author={Niehus, David}, year={2017}
    }'
  chicago: Niehus, David. <i>Semantically Secure Attribute-Based Searchable Encryption</i>.
    Universität Paderborn, 2017.
  ieee: D. Niehus, <i>Semantically Secure Attribute-based Searchable Encryption</i>.
    Universität Paderborn, 2017.
  mla: Niehus, David. <i>Semantically Secure Attribute-Based Searchable Encryption</i>.
    Universität Paderborn, 2017.
  short: D. Niehus, Semantically Secure Attribute-Based Searchable Encryption, Universität
    Paderborn, 2017.
date_created: 2017-10-17T12:41:03Z
date_updated: 2022-01-06T07:02:49Z
department:
- _id: '64'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Semantically Secure Attribute-based Searchable Encryption
type: mastersthesis
user_id: '477'
year: '2017'
...
---
_id: '88'
author:
- first_name: Advait
  full_name: Ganesh Athreya, Advait
  last_name: Ganesh Athreya
citation:
  ama: Ganesh Athreya A. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>.
    Universität Paderborn; 2017.
  apa: Ganesh Athreya, A. (2017). <i>Instantiating a Predicate Encryption Scheme via
    Pair Encodings</i>. Universität Paderborn.
  bibtex: '@book{Ganesh Athreya_2017, title={Instantiating a Predicate Encryption
    Scheme via Pair Encodings}, publisher={Universität Paderborn}, author={Ganesh
    Athreya, Advait}, year={2017} }'
  chicago: Ganesh Athreya, Advait. <i>Instantiating a Predicate Encryption Scheme
    via Pair Encodings</i>. Universität Paderborn, 2017.
  ieee: A. Ganesh Athreya, <i>Instantiating a Predicate Encryption Scheme via Pair
    Encodings</i>. Universität Paderborn, 2017.
  mla: Ganesh Athreya, Advait. <i>Instantiating a Predicate Encryption Scheme via
    Pair Encodings</i>. Universität Paderborn, 2017.
  short: A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings,
    Universität Paderborn, 2017.
date_created: 2017-10-17T12:41:08Z
date_updated: 2022-01-06T07:04:02Z
department:
- _id: '64'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Instantiating a Predicate Encryption Scheme via Pair Encodings
type: bachelorsthesis
user_id: '477'
year: '2017'
...
---
_id: '67'
author:
- first_name: Mirko
  full_name: Jürgens, Mirko
  last_name: Jürgens
citation:
  ama: Jürgens M. <i>Provably Secure Key-Derivation-Functions for Certain Types of
    Applications</i>. Universität Paderborn; 2017.
  apa: Jürgens, M. (2017). <i>Provably Secure Key-Derivation-Functions for Certain
    Types of Applications</i>. Universität Paderborn.
  bibtex: '@book{Jürgens_2017, title={Provably Secure Key-Derivation-Functions for
    Certain Types of Applications}, publisher={Universität Paderborn}, author={Jürgens,
    Mirko}, year={2017} }'
  chicago: Jürgens, Mirko. <i>Provably Secure Key-Derivation-Functions for Certain
    Types of Applications</i>. Universität Paderborn, 2017.
  ieee: M. Jürgens, <i>Provably Secure Key-Derivation-Functions for Certain Types
    of Applications</i>. Universität Paderborn, 2017.
  mla: Jürgens, Mirko. <i>Provably Secure Key-Derivation-Functions for Certain Types
    of Applications</i>. Universität Paderborn, 2017.
  short: M. Jürgens, Provably Secure Key-Derivation-Functions for Certain Types of
    Applications, Universität Paderborn, 2017.
date_created: 2017-10-17T12:41:04Z
date_updated: 2022-01-06T07:03:15Z
department:
- _id: '64'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Provably Secure Key-Derivation-Functions for Certain Types of Applications
type: bachelorsthesis
user_id: '477'
year: '2017'
...
---
_id: '104'
author:
- first_name: Denis
  full_name: Diemert, Denis
  last_name: Diemert
citation:
  ama: Diemert D. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>.
    Universität Paderborn; 2017.
  apa: Diemert, D. (2017). <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>.
    Universität Paderborn.
  bibtex: '@book{Diemert_2017, title={EAX - An Authenticated Encryption Mode for Block
    Ciphers}, publisher={Universität Paderborn}, author={Diemert, Denis}, year={2017}
    }'
  chicago: Diemert, Denis. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>.
    Universität Paderborn, 2017.
  ieee: D. Diemert, <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>.
    Universität Paderborn, 2017.
  mla: Diemert, Denis. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>.
    Universität Paderborn, 2017.
  short: D. Diemert, EAX - An Authenticated Encryption Mode for Block Ciphers, Universität
    Paderborn, 2017.
date_created: 2017-10-17T12:41:11Z
date_updated: 2022-01-06T06:50:38Z
department:
- _id: '64'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: EAX - An Authenticated Encryption Mode for Block Ciphers
type: bachelorsthesis
user_id: '477'
year: '2017'
...
---
_id: '117'
author:
- first_name: Pascal
  full_name: Bemmann, Pascal
  id: '32571'
  last_name: Bemmann
citation:
  ama: Bemmann P. <i>Attribute-Based Signatures Using Structure Preserving Signatures</i>.
    Universität Paderborn; 2017.
  apa: Bemmann, P. (2017). <i>Attribute-based Signatures using Structure Preserving
    Signatures</i>. Universität Paderborn.
  bibtex: '@book{Bemmann_2017, title={Attribute-based Signatures using Structure Preserving
    Signatures}, publisher={Universität Paderborn}, author={Bemmann, Pascal}, year={2017}
    }'
  chicago: Bemmann, Pascal. <i>Attribute-Based Signatures Using Structure Preserving
    Signatures</i>. Universität Paderborn, 2017.
  ieee: P. Bemmann, <i>Attribute-based Signatures using Structure Preserving Signatures</i>.
    Universität Paderborn, 2017.
  mla: Bemmann, Pascal. <i>Attribute-Based Signatures Using Structure Preserving Signatures</i>.
    Universität Paderborn, 2017.
  short: P. Bemmann, Attribute-Based Signatures Using Structure Preserving Signatures,
    Universität Paderborn, 2017.
date_created: 2017-10-17T12:41:14Z
date_updated: 2022-01-06T06:51:06Z
department:
- _id: '64'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Attribute-based Signatures using Structure Preserving Signatures
type: mastersthesis
user_id: '25078'
year: '2017'
...
---
_id: '2898'
author:
- first_name: Eduard
  full_name: Weis, Eduard
  last_name: Weis
citation:
  ama: Weis E. <i>Searchable Encryption</i>.; 2016.
  apa: Weis, E. (2016). <i>Searchable Encryption</i>.
  bibtex: '@book{Weis_2016, title={Searchable Encryption}, author={Weis, Eduard},
    year={2016} }'
  chicago: Weis, Eduard. <i>Searchable Encryption</i>, 2016.
  ieee: E. Weis, <i>Searchable Encryption</i>. 2016.
  mla: Weis, Eduard. <i>Searchable Encryption</i>. 2016.
  short: E. Weis, Searchable Encryption, 2016.
date_created: 2018-05-25T09:43:39Z
date_updated: 2022-01-06T06:58:42Z
department:
- _id: '64'
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Searchable Encryption
type: mastersthesis
user_id: '25078'
year: '2016'
...
---
_id: '2947'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
citation:
  ama: 'Blömer J, Günther P. Singular Curve Point Decompression Attack. In: <i>2015
    Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE; 2016.
    doi:<a href="https://doi.org/10.1109/fdtc.2015.17">10.1109/fdtc.2015.17</a>'
  apa: Blömer, J., &#38; Günther, P. (2016). Singular Curve Point Decompression Attack.
    In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>.
    IEEE. <a href="https://doi.org/10.1109/fdtc.2015.17">https://doi.org/10.1109/fdtc.2015.17</a>
  bibtex: '@inproceedings{Blömer_Günther_2016, title={Singular Curve Point Decompression
    Attack}, DOI={<a href="https://doi.org/10.1109/fdtc.2015.17">10.1109/fdtc.2015.17</a>},
    booktitle={2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)},
    publisher={IEEE}, author={Blömer, Johannes and Günther, Peter}, year={2016} }'
  chicago: Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression
    Attack.” In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography
    (FDTC)</i>. IEEE, 2016. <a href="https://doi.org/10.1109/fdtc.2015.17">https://doi.org/10.1109/fdtc.2015.17</a>.
  ieee: J. Blömer and P. Günther, “Singular Curve Point Decompression Attack,” in
    <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>,
    2016.
  mla: Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.”
    <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>,
    IEEE, 2016, doi:<a href="https://doi.org/10.1109/fdtc.2015.17">10.1109/fdtc.2015.17</a>.
  short: 'J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance
    in Cryptography (FDTC), IEEE, 2016.'
date_created: 2018-05-29T11:25:43Z
date_updated: 2022-01-06T06:58:48Z
department:
- _id: '64'
doi: 10.1109/fdtc.2015.17
project:
- _id: '43'
  name: Securing the Financial Cloud
publication: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
publication_identifier:
  isbn:
  - '9781467375795'
publication_status: published
publisher: IEEE
status: public
title: Singular Curve Point Decompression Attack
type: conference
user_id: '25078'
year: '2016'
...
---
_id: '2948'
author:
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
citation:
  ama: 'Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based
    Smart Card Architectures. In: <i>Mathematical Aspects of Computer and Information
    Sciences</i>. Cham: Springer International Publishing; 2016:151-165. doi:<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>'
  apa: 'Günther, P., &#38; Krummel, V. (2016). Implementing Cryptographic Pairings
    on Accumulator Based Smart Card Architectures. In <i>Mathematical Aspects of Computer
    and Information Sciences</i> (pp. 151–165). Cham: Springer International Publishing.
    <a href="https://doi.org/10.1007/978-3-319-32859-1_13">https://doi.org/10.1007/978-3-319-32859-1_13</a>'
  bibtex: '@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic
    Pairings on Accumulator Based Smart Card Architectures}, DOI={<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>},
    booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer
    International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016},
    pages={151–165} }'
  chicago: 'Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings
    on Accumulator Based Smart Card Architectures.” In <i>Mathematical Aspects of
    Computer and Information Sciences</i>, 151–65. Cham: Springer International Publishing,
    2016. <a href="https://doi.org/10.1007/978-3-319-32859-1_13">https://doi.org/10.1007/978-3-319-32859-1_13</a>.'
  ieee: 'P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator
    Based Smart Card Architectures,” in <i>Mathematical Aspects of Computer and Information
    Sciences</i>, Cham: Springer International Publishing, 2016, pp. 151–165.'
  mla: Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on
    Accumulator Based Smart Card Architectures.” <i>Mathematical Aspects of Computer
    and Information Sciences</i>, Springer International Publishing, 2016, pp. 151–65,
    doi:<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>.
  short: 'P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information
    Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.'
date_created: 2018-05-29T11:26:56Z
date_updated: 2022-01-06T06:58:48Z
department:
- _id: '64'
doi: 10.1007/978-3-319-32859-1_13
page: 151-165
place: Cham
project:
- _id: '43'
  name: Securing the Financial Cloud
publication: Mathematical Aspects of Computer and Information Sciences
publication_identifier:
  isbn:
  - '9783319328584'
  - '9783319328591'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2968'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Christiane
  full_name: Lammersen, Christiane
  last_name: Lammersen
- first_name: Melanie
  full_name: Schmidt, Melanie
  last_name: Schmidt
- first_name: Christian
  full_name: Sohler, Christian
  last_name: Sohler
citation:
  ama: 'Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means
    Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International
    Publishing; 2016:81-116. doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>'
  apa: 'Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical
    Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i>
    (pp. 81–116). Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>'
  bibtex: '@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical
    Analysis of the k-Means Algorithm – A Survey}, DOI={<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>},
    booktitle={Algorithm Engineering}, publisher={Springer International Publishing},
    author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler,
    Christian}, year={2016}, pages={81–116} }'
  chicago: 'Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian
    Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm
    Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>.'
  ieee: 'J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis
    of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer
    International Publishing, 2016, pp. 81–116.'
  mla: Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A
    Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016,
    pp. 81–116, doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>.
  short: 'J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering,
    Springer International Publishing, Cham, 2016, pp. 81–116.'
date_created: 2018-06-04T12:22:40Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-49487-6_3
page: 81-116
place: Cham
publication: Algorithm Engineering
publication_identifier:
  isbn:
  - '9783319494869'
  - '9783319494876'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Theoretical Analysis of the k-Means Algorithm – A Survey
type: book_chapter
user_id: '25078'
year: '2016'
...
