[{"type":"bachelorsthesis","status":"public","abstract":[{"lang":"eng","text":"RSA Full Domain Hash ist im Zufallsorakelmodell ein EUF-CMA sicheres Signaturverfahren (existentially unforgeable under chosen-message attacks). Der Sicherheitsbeweis wird unter anderem in der Vorlesung Einf{\\\"u}hrung in die Kryptographie vorgestellt. Auch bei einer genaueren Analyse verliert man bei der Reduktion einen Faktor \\nicefrac{1}{q_{s}}(wobei q_{s}die Anzahl der Anfragen an das Signaturorakel darstellt), was f{\\\"u}r die Praxis in relativ großen Systemparametern (RSA-Modul) resultiert [1].Seit der Ver{\\\"o}ffentlichung von [2] wurde geglaubt, dass der Faktor \\nicefrac{1}{q_{s}}optimal ist. Erst zehn Jahre sp{\\\"a}ter offenbarten die Autoren von [3] einen Fehler in [2] und zeigten eine bessere Reduktion allerdings unter einer etwas st{\\\"a}rkeren Sicherheitsannahme.Die Ergebnisse aus [3] lassen sich auf PSS-Verfahren (Probabilistic Signature Scheme), das z.B. in PKCS #1 benutzt wird, {\\\"u}bertragen und sind somit von großer Bedeutung f{\\\"u}r die Praxis. Weiterhin sind die in den Beweisen verwendete Techniken n{\\\"u}tzlich auch bei anderen kryptographischen Verfahren.In Rahmen dieser Arbeit sollen die entsprechenden Sicherheitsbeweise aufgearbeitet und dessen Auswirkungen f{\\\"u}r die Praxis analysiert werden.[1] J.S. Coron, “On the Exact Security of Full Domain Hash”, CRYPTO 2000. LNCS 1880, pp. 229-235, 2000.[2] J.S. Coron, “Optimal security proofs for PPS and other signature schemes”, EUROCRYPT 2002. LNCS 2332, pp 272-287, 2002.[3] S.A. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited”, in EUROCRYPT 2012. LNCS 7237, pp 537-553, 2012."}],"user_id":"477","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"369","citation":{"ama":"Rath T. <i>RSA-Full Domain Hash Revisited</i>. Universität Paderborn; 2014.","chicago":"Rath, Timo. <i>RSA-Full Domain Hash Revisited</i>. Universität Paderborn, 2014.","ieee":"T. Rath, <i>RSA-Full Domain Hash Revisited</i>. Universität Paderborn, 2014.","short":"T. Rath, RSA-Full Domain Hash Revisited, Universität Paderborn, 2014.","mla":"Rath, Timo. <i>RSA-Full Domain Hash Revisited</i>. Universität Paderborn, 2014.","bibtex":"@book{Rath_2014, title={RSA-Full Domain Hash Revisited}, publisher={Universität Paderborn}, author={Rath, Timo}, year={2014} }","apa":"Rath, T. (2014). <i>RSA-Full Domain Hash Revisited</i>. Universität Paderborn."},"year":"2014","author":[{"full_name":"Rath, Timo","last_name":"Rath","first_name":"Timo"}],"date_created":"2017-10-17T12:42:04Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_updated":"2022-01-06T06:59:30Z","publisher":"Universität Paderborn","title":"RSA-Full Domain Hash Revisited"},{"file_date_updated":"2018-03-20T07:16:32Z","ddc":["040"],"department":[{"_id":"79"}],"user_id":"15504","series_title":"LNCS","_id":"371","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"status":"public","file":[{"file_id":"1401","access_level":"closed","file_name":"371-RoBuSt-OPODIS.pdf","file_size":269941,"date_created":"2018-03-20T07:16:32Z","creator":"florida","date_updated":"2018-03-20T07:16:32Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"abstract":[{"text":"In this work we present the first distributed storage system that is provably robust against crash failures issued by an adaptive adversary, i.e., for each batch of requests the adversary can decide based on the entire system state which servers will be unavailable for that batch of requests. Despite up to \\gamma n^{1/\\log\\log n} crashed servers, with \\gamma>0 constant and n denoting the number of servers, our system can correctly process any batch of lookup and write requests (with at most a polylogarithmic number of requests issued at each non-crashed server) in at most a polylogarithmic number of communication rounds, with at most polylogarithmic time and work at each server and only a logarithmic storage overhead. Our system is based on previous work by Eikel and Scheideler (SPAA 2013), who presented IRIS, a distributed information system that is provably robust against the same kind of crash failures. However, IRIS is only able to serve lookup requests. Handling both lookup and write requests has turned out to require major changes in the design of IRIS.","lang":"eng"}],"publication":"Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS)","type":"conference","doi":"10.1007/978-3-319-14472-6_8","title":"RoBuSt: A Crash-Failure-Resistant Distributed Storage System","author":[{"first_name":"Christian","last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian"},{"full_name":"Setzer, Alexander","id":"11108","last_name":"Setzer","first_name":"Alexander"},{"first_name":"Martina","last_name":"Eikel","full_name":"Eikel, Martina"}],"date_created":"2017-10-17T12:42:04Z","date_updated":"2022-01-06T06:59:31Z","page":"107--122","citation":{"ama":"Scheideler C, Setzer A, Eikel M. RoBuSt: A Crash-Failure-Resistant Distributed Storage System. In: <i>Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS)</i>. LNCS. ; 2014:107--122. doi:<a href=\"https://doi.org/10.1007/978-3-319-14472-6_8\">10.1007/978-3-319-14472-6_8</a>","ieee":"C. Scheideler, A. Setzer, and M. Eikel, “RoBuSt: A Crash-Failure-Resistant Distributed Storage System,” in <i>Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS)</i>, 2014, pp. 107--122.","chicago":"Scheideler, Christian, Alexander Setzer, and Martina Eikel. “RoBuSt: A Crash-Failure-Resistant Distributed Storage System.” In <i>Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS)</i>, 107--122. LNCS, 2014. <a href=\"https://doi.org/10.1007/978-3-319-14472-6_8\">https://doi.org/10.1007/978-3-319-14472-6_8</a>.","apa":"Scheideler, C., Setzer, A., &#38; Eikel, M. (2014). RoBuSt: A Crash-Failure-Resistant Distributed Storage System. In <i>Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS)</i> (pp. 107--122). <a href=\"https://doi.org/10.1007/978-3-319-14472-6_8\">https://doi.org/10.1007/978-3-319-14472-6_8</a>","short":"C. Scheideler, A. Setzer, M. Eikel, in: Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122.","bibtex":"@inproceedings{Scheideler_Setzer_Eikel_2014, series={LNCS}, title={RoBuSt: A Crash-Failure-Resistant Distributed Storage System}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-14472-6_8\">10.1007/978-3-319-14472-6_8</a>}, booktitle={Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS)}, author={Scheideler, Christian and Setzer, Alexander and Eikel, Martina}, year={2014}, pages={107--122}, collection={LNCS} }","mla":"Scheideler, Christian, et al. “RoBuSt: A Crash-Failure-Resistant Distributed Storage System.” <i>Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS)</i>, 2014, pp. 107--122, doi:<a href=\"https://doi.org/10.1007/978-3-319-14472-6_8\">10.1007/978-3-319-14472-6_8</a>."},"year":"2014","has_accepted_license":"1"},{"department":[{"_id":"79"}],"user_id":"477","_id":"378","project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C1","_id":"13"},{"name":"SFB 901 - Project Area A","_id":"2"}],"file_date_updated":"2018-03-20T07:13:36Z","ddc":["040"],"publication":"Theory of Computing Systems","type":"journal_article","status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"1396","access_level":"closed","file_name":"378-re-chord_journal.pdf","file_size":310961,"date_created":"2018-03-20T07:13:36Z","creator":"florida","date_updated":"2018-03-20T07:13:36Z"}],"abstract":[{"lang":"eng","text":"The Chord peer-to-peer system is considered, together with CAN, Tapestry and Pastry, as one of the pioneering works on peer-to-peer distributed hash tables (DHT) that inspired a large volume of papers and projects on DHTs as well as peer-to-peer systems in general. Chord, in particular, has been studied thoroughly, and many variants of Chord have been presented that optimize various criteria. Also, several implementations of Chord are available on various platforms. Though Chord is known to be very efficient and scalable and it can handle churn quite well, no protocol is known yet that guarantees that Chord is self-stabilizing, i.e., the Chord network can be recovered from any initial state in which the network is still weakly connected. This is not too surprising since it is known that the Chord network is not locally checkable for its current topology. We present a slight extension of the Chord network, called Re-Chord (reactive Chord), that turns out to be locally checkable, and we present a self-stabilizing distributed protocol for it that can recover the Re-Chord network from any initial state, in which the n peers are weakly connected, in O(nlogn) communication rounds. We also show that our protocol allows a new peer to join or an old peer to leave an already stable Re-Chord network so that within O(logn)^2) communication rounds the Re-Chord network is stable again."}],"author":[{"full_name":"Kniesburges, Sebastian","last_name":"Kniesburges","first_name":"Sebastian"},{"last_name":"Koutsopoulos","full_name":"Koutsopoulos, Andreas","first_name":"Andreas"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}],"date_created":"2017-10-17T12:42:05Z","publisher":"Springer","date_updated":"2022-01-06T06:59:35Z","doi":"10.1007/s00224-012-9431-2","title":"Re-Chord: A Self-stabilizing Chord Overlay Network","issue":"3","has_accepted_license":"1","page":"591-612","citation":{"bibtex":"@article{Kniesburges_Koutsopoulos_Scheideler_2014, title={Re-Chord: A Self-stabilizing Chord Overlay Network}, DOI={<a href=\"https://doi.org/10.1007/s00224-012-9431-2\">10.1007/s00224-012-9431-2</a>}, number={3}, journal={Theory of Computing Systems}, publisher={Springer}, author={Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler, Christian}, year={2014}, pages={591–612} }","mla":"Kniesburges, Sebastian, et al. “Re-Chord: A Self-Stabilizing Chord Overlay Network.” <i>Theory of Computing Systems</i>, no. 3, Springer, 2014, pp. 591–612, doi:<a href=\"https://doi.org/10.1007/s00224-012-9431-2\">10.1007/s00224-012-9431-2</a>.","short":"S. Kniesburges, A. Koutsopoulos, C. Scheideler, Theory of Computing Systems (2014) 591–612.","apa":"Kniesburges, S., Koutsopoulos, A., &#38; Scheideler, C. (2014). Re-Chord: A Self-stabilizing Chord Overlay Network. <i>Theory of Computing Systems</i>, (3), 591–612. <a href=\"https://doi.org/10.1007/s00224-012-9431-2\">https://doi.org/10.1007/s00224-012-9431-2</a>","ieee":"S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “Re-Chord: A Self-stabilizing Chord Overlay Network,” <i>Theory of Computing Systems</i>, no. 3, pp. 591–612, 2014.","chicago":"Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “Re-Chord: A Self-Stabilizing Chord Overlay Network.” <i>Theory of Computing Systems</i>, no. 3 (2014): 591–612. <a href=\"https://doi.org/10.1007/s00224-012-9431-2\">https://doi.org/10.1007/s00224-012-9431-2</a>.","ama":"Kniesburges S, Koutsopoulos A, Scheideler C. Re-Chord: A Self-stabilizing Chord Overlay Network. <i>Theory of Computing Systems</i>. 2014;(3):591-612. doi:<a href=\"https://doi.org/10.1007/s00224-012-9431-2\">10.1007/s00224-012-9431-2</a>"},"year":"2014"},{"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"384","user_id":"15504","ddc":["040"],"file_date_updated":"2018-03-20T07:04:20Z","type":"conference","publication":"Proceedings of the 29th Symposium On Applied Computing (SAC)","abstract":[{"lang":"eng","text":"Reputation systems provide reputation values of rated parties to users. These reputation values, typically aggregations of individual user ratings, shall be reliable, i.e. should enable a realistic assessment of the probability that the rated party behaves as expected in a transaction. In order for the reputation values to stay reliable and, thus, for the reputation system to provide a beneﬁt, the system needs to be resistant against manipulations by users, the rated parties trying to improve their reputation values, and even against competitors trying to worsen a reputation value. At the same time, a reputation system shall provide privacy protection for users: rated parties shall not be able to learn who provided a certain rating. Otherwise users might not take part in the system as they fear bad feedback in revenge for bad ratings, or users do not want to be connected to certain transactions based on their provided ratings. In this paper we come up with a solution that provides both, reliability of reputation values on the one hand, and privacy protection for users on the other hand. In contrast to related work, our solution only makes use of a single reputation provider that needs to be trusted (to a certain extent) and does not require any bulletin boards to be present in the system. We make use of the Paillier cryptosystem to provide an aggregation of individual user ratings in a way that no party can learn which user provided a certain rating."}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"florida","date_created":"2018-03-20T07:04:20Z","date_updated":"2018-03-20T07:04:20Z","access_level":"closed","file_id":"1391","file_name":"384-reputationsystem_01.pdf","file_size":505927}],"status":"public","date_updated":"2022-01-06T06:59:42Z","date_created":"2017-10-17T12:42:06Z","author":[{"last_name":"Petrlic","full_name":"Petrlic, Ronald","first_name":"Ronald"},{"last_name":"Lutters","full_name":"Lutters, Sascha","first_name":"Sascha"},{"last_name":"Sorge","full_name":"Sorge, Christoph","first_name":"Christoph"}],"title":"Privacy-Preserving Reputation Management","doi":"10.1145/2554850.2554881","has_accepted_license":"1","year":"2014","citation":{"bibtex":"@inproceedings{Petrlic_Lutters_Sorge_2014, title={Privacy-Preserving Reputation Management}, DOI={<a href=\"https://doi.org/10.1145/2554850.2554881\">10.1145/2554850.2554881</a>}, booktitle={Proceedings of the 29th Symposium On Applied Computing (SAC)}, author={Petrlic, Ronald and Lutters, Sascha and Sorge, Christoph}, year={2014}, pages={1712–1718} }","mla":"Petrlic, Ronald, et al. “Privacy-Preserving Reputation Management.” <i>Proceedings of the 29th Symposium On Applied Computing (SAC)</i>, 2014, pp. 1712–18, doi:<a href=\"https://doi.org/10.1145/2554850.2554881\">10.1145/2554850.2554881</a>.","short":"R. Petrlic, S. Lutters, C. Sorge, in: Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–1718.","apa":"Petrlic, R., Lutters, S., &#38; Sorge, C. (2014). Privacy-Preserving Reputation Management. In <i>Proceedings of the 29th Symposium On Applied Computing (SAC)</i> (pp. 1712–1718). <a href=\"https://doi.org/10.1145/2554850.2554881\">https://doi.org/10.1145/2554850.2554881</a>","chicago":"Petrlic, Ronald, Sascha Lutters, and Christoph Sorge. “Privacy-Preserving Reputation Management.” In <i>Proceedings of the 29th Symposium On Applied Computing (SAC)</i>, 1712–18, 2014. <a href=\"https://doi.org/10.1145/2554850.2554881\">https://doi.org/10.1145/2554850.2554881</a>.","ieee":"R. Petrlic, S. Lutters, and C. Sorge, “Privacy-Preserving Reputation Management,” in <i>Proceedings of the 29th Symposium On Applied Computing (SAC)</i>, 2014, pp. 1712–1718.","ama":"Petrlic R, Lutters S, Sorge C. Privacy-Preserving Reputation Management. In: <i>Proceedings of the 29th Symposium On Applied Computing (SAC)</i>. ; 2014:1712-1718. doi:<a href=\"https://doi.org/10.1145/2554850.2554881\">10.1145/2554850.2554881</a>"},"page":"1712-1718"},{"date_updated":"2022-01-06T06:59:45Z","publisher":"Universität Paderborn","author":[{"first_name":"Ronald","full_name":"Petrlic, Ronald","last_name":"Petrlic"}],"date_created":"2017-10-17T12:42:07Z","title":"Privacy-Preserving Multiparty Digital Rights Management","has_accepted_license":"1","year":"2014","citation":{"ama":"Petrlic R. <i>Privacy-Preserving Multiparty Digital Rights Management</i>. Universität Paderborn; 2014.","ieee":"R. Petrlic, <i>Privacy-Preserving Multiparty Digital Rights Management</i>. Universität Paderborn, 2014.","chicago":"Petrlic, Ronald. <i>Privacy-Preserving Multiparty Digital Rights Management</i>. Universität Paderborn, 2014.","apa":"Petrlic, R. (2014). <i>Privacy-Preserving Multiparty Digital Rights Management</i>. Universität Paderborn.","bibtex":"@book{Petrlic_2014, title={Privacy-Preserving Multiparty Digital Rights Management}, publisher={Universität Paderborn}, author={Petrlic, Ronald}, year={2014} }","short":"R. Petrlic, Privacy-Preserving Multiparty Digital Rights Management, Universität Paderborn, 2014.","mla":"Petrlic, Ronald. <i>Privacy-Preserving Multiparty Digital Rights Management</i>. Universität Paderborn, 2014."},"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"385","user_id":"477","ddc":["040"],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-20T07:03:37Z","type":"dissertation","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-20T07:03:37Z","creator":"florida","date_created":"2018-03-20T07:03:37Z","file_size":2962042,"access_level":"closed","file_name":"385-arbeit1.pdf","file_id":"1390"}],"status":"public"},{"status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_name":"386-NTMS14.pdf","file_id":"1389","file_size":216843,"creator":"florida","date_created":"2018-03-20T07:03:02Z","date_updated":"2018-03-20T07:03:02Z"}],"abstract":[{"lang":"eng","text":"We present a privacy-preserving multiparty DRM scheme that does not need a trusted third party. Users anonymously buy content from content providers and anonymously execute it at content execution centers. The executions are unlinkable to each other. The license check is performed as part of the used ciphertext-policy attribute-based encryption (CP-ABE) and, thus, access control is cryptographically enforced. The problem of authorization proof towards the key center in an ABE scheme is solved by a combination with anonymous payments."}],"publication":"Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS)","type":"conference","file_date_updated":"2018-03-20T07:03:02Z","ddc":["040"],"user_id":"15504","_id":"386","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"page":"1-5","citation":{"ama":"Petrlic R, Sorge C. Privacy-Preserving Digital Rights Management based on Attribute-based Encryption. In: <i>Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS)</i>. ; 2014:1-5. doi:<a href=\"https://doi.org/10.1109/NTMS.2014.6814044\">10.1109/NTMS.2014.6814044</a>","chicago":"Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving Digital Rights Management Based on Attribute-Based Encryption.” In <i>Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS)</i>, 1–5, 2014. <a href=\"https://doi.org/10.1109/NTMS.2014.6814044\">https://doi.org/10.1109/NTMS.2014.6814044</a>.","ieee":"R. Petrlic and C. Sorge, “Privacy-Preserving Digital Rights Management based on Attribute-based Encryption,” in <i>Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS)</i>, 2014, pp. 1–5.","bibtex":"@inproceedings{Petrlic_Sorge_2014, title={Privacy-Preserving Digital Rights Management based on Attribute-based Encryption}, DOI={<a href=\"https://doi.org/10.1109/NTMS.2014.6814044\">10.1109/NTMS.2014.6814044</a>}, booktitle={Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS)}, author={Petrlic, Ronald and Sorge, Christoph}, year={2014}, pages={1–5} }","short":"R. Petrlic, C. Sorge, in: Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5.","mla":"Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving Digital Rights Management Based on Attribute-Based Encryption.” <i>Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS)</i>, 2014, pp. 1–5, doi:<a href=\"https://doi.org/10.1109/NTMS.2014.6814044\">10.1109/NTMS.2014.6814044</a>.","apa":"Petrlic, R., &#38; Sorge, C. (2014). Privacy-Preserving Digital Rights Management based on Attribute-based Encryption. In <i>Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS)</i> (pp. 1–5). <a href=\"https://doi.org/10.1109/NTMS.2014.6814044\">https://doi.org/10.1109/NTMS.2014.6814044</a>"},"year":"2014","has_accepted_license":"1","doi":"10.1109/NTMS.2014.6814044","title":"Privacy-Preserving Digital Rights Management based on Attribute-based Encryption","date_created":"2017-10-17T12:42:07Z","author":[{"first_name":"Ronald","full_name":"Petrlic, Ronald","last_name":"Petrlic"},{"first_name":"Christoph","last_name":"Sorge","full_name":"Sorge, Christoph"}],"date_updated":"2022-01-06T06:59:46Z"},{"title":"Principles of Robust Medium Access and an Application to Leader Election","doi":"10.1145/2635818","date_updated":"2022-01-06T06:59:47Z","publisher":"ACM","date_created":"2017-10-17T12:42:07Z","author":[{"first_name":"Baruch","full_name":"Awerbuch, Baruch","last_name":"Awerbuch"},{"first_name":"Andrea W.","full_name":"Richa, Andrea W.","last_name":"Richa"},{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"},{"full_name":"Schmid, Stefan","last_name":"Schmid","first_name":"Stefan"},{"full_name":"Zhang, Jin","last_name":"Zhang","first_name":"Jin"}],"year":"2014","citation":{"chicago":"Awerbuch, Baruch, Andrea W. Richa, Christian Scheideler, Stefan Schmid, and Jin Zhang. “Principles of Robust Medium Access and an Application to Leader Election.” <i>Transactions on Algorithms</i>, no. 4 (2014). <a href=\"https://doi.org/10.1145/2635818\">https://doi.org/10.1145/2635818</a>.","ieee":"B. Awerbuch, A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Principles of Robust Medium Access and an Application to Leader Election,” <i>Transactions on Algorithms</i>, no. 4, 2014.","ama":"Awerbuch B, Richa AW, Scheideler C, Schmid S, Zhang J. Principles of Robust Medium Access and an Application to Leader Election. <i>Transactions on Algorithms</i>. 2014;(4). doi:<a href=\"https://doi.org/10.1145/2635818\">10.1145/2635818</a>","apa":"Awerbuch, B., Richa, A. W., Scheideler, C., Schmid, S., &#38; Zhang, J. (2014). Principles of Robust Medium Access and an Application to Leader Election. <i>Transactions on Algorithms</i>, (4). <a href=\"https://doi.org/10.1145/2635818\">https://doi.org/10.1145/2635818</a>","mla":"Awerbuch, Baruch, et al. “Principles of Robust Medium Access and an Application to Leader Election.” <i>Transactions on Algorithms</i>, no. 4, ACM, 2014, doi:<a href=\"https://doi.org/10.1145/2635818\">10.1145/2635818</a>.","bibtex":"@article{Awerbuch_Richa_Scheideler_Schmid_Zhang_2014, title={Principles of Robust Medium Access and an Application to Leader Election}, DOI={<a href=\"https://doi.org/10.1145/2635818\">10.1145/2635818</a>}, number={4}, journal={Transactions on Algorithms}, publisher={ACM}, author={Awerbuch, Baruch and Richa, Andrea W. and Scheideler, Christian and Schmid, Stefan and Zhang, Jin}, year={2014} }","short":"B. Awerbuch, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, Transactions on Algorithms (2014)."},"has_accepted_license":"1","issue":"4","ddc":["040"],"file_date_updated":"2018-03-20T07:02:33Z","_id":"387","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"department":[{"_id":"79"}],"user_id":"477","abstract":[{"text":"This article studies the design of medium access control (MAC) protocols for wireless networks that are provably robust against arbitrary and unpredictable disruptions (e.g., due to unintentional external interference from co-existing networks or due to jamming). We consider a wireless network consisting of a set of n honest and reliable nodes within transmission (and interference) range of each other, and we model the external disruptions with a powerful adaptive adversary. This adversary may know the protocol and its entire history and can use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1 − )-fraction of the timesteps, for an arbitrary constant > 0 unknown to the nodes. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant (asymptotically optimal) throughput for the nonjammed time periods under any of the aforementioned adversarial strategies. The derived principles are also useful to build robust applications on top of the MAC layer, and we present an exemplary study for leader election, one of the most fundamental tasks in distributed computing.","lang":"eng"}],"status":"public","file":[{"creator":"florida","date_created":"2018-03-20T07:02:33Z","date_updated":"2018-03-20T07:02:33Z","file_name":"387-a24-awerbuch_2_.pdf","access_level":"closed","file_id":"1388","file_size":521454,"content_type":"application/pdf","relation":"main_file","success":1}],"publication":"Transactions on Algorithms","type":"journal_article"},{"title":"Ein selbst-stabilisierender Algorithmus für das Finite Sleep Problem in Skip+ Graphen","date_created":"2020-08-17T08:16:07Z","supervisor":[{"full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler","first_name":"Christian"}],"author":[{"first_name":"Linghui","full_name":"Luo, Linghui","last_name":"Luo"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:53:25Z","citation":{"short":"L. Luo, Ein Selbst-Stabilisierender Algorithmus Für Das Finite Sleep Problem in Skip+ Graphen, Universität Paderborn, 2014.","bibtex":"@book{Luo_2014, title={Ein selbst-stabilisierender Algorithmus für das Finite Sleep Problem in Skip+ Graphen}, publisher={Universität Paderborn}, author={Luo, Linghui}, year={2014} }","mla":"Luo, Linghui. <i>Ein Selbst-Stabilisierender Algorithmus Für Das Finite Sleep Problem in Skip+ Graphen</i>. Universität Paderborn, 2014.","apa":"Luo, L. (2014). <i>Ein selbst-stabilisierender Algorithmus für das Finite Sleep Problem in Skip+ Graphen</i>. Universität Paderborn.","chicago":"Luo, Linghui. <i>Ein Selbst-Stabilisierender Algorithmus Für Das Finite Sleep Problem in Skip+ Graphen</i>. Universität Paderborn, 2014.","ieee":"L. Luo, <i>Ein selbst-stabilisierender Algorithmus für das Finite Sleep Problem in Skip+ Graphen</i>. Universität Paderborn, 2014.","ama":"Luo L. <i>Ein Selbst-Stabilisierender Algorithmus Für Das Finite Sleep Problem in Skip+ Graphen</i>. Universität Paderborn; 2014."},"year":"2014","language":[{"iso":"eng"}],"user_id":"477","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"_id":"18001","status":"public","type":"bachelorsthesis"},{"user_id":"15504","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"441","file_date_updated":"2018-03-16T11:29:22Z","ddc":["040"],"type":"conference","publication":"Tagungsband des 17. Internationalen Rechtsinformatik Symposions","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":207583,"access_level":"closed","file_id":"1352","file_name":"441-sorge-petrlic-iris2014_01.pdf","date_updated":"2018-03-16T11:29:22Z","date_created":"2018-03-16T11:29:22Z","creator":"florida"}],"status":"public","abstract":[{"lang":"eng","text":"Das Future Internet soll den Anforderungen heutiger und zuk{\\\"u}nftiger daten-intensiver Internet-Anwendungen besser gerecht werden als dies heute der Fall ist. Seit einigen Jahren wird an unterschiedlichen Verfahren geforscht, die das „Future Internet“ erm{\\\"o}glichen sollen – diese Ans{\\\"a}tze gehen weit {\\\"u}ber die Ziele von IPv6 hinaus. In diesem Beitrag stellen wir einige Kernpunkte der Future-Internet-Initiativen vor und identifizieren Gemeinsamkeiten der unterschiedlichen Konzepte. Wir beleuchten die Konsequenzen aus datenschutzrechtlicher Sicht und geben einen {\\\"U}berblick {\\\"u}ber Ans{\\\"a}tze, die die identifizierten Datenschutz-Probleme durch technische Maßnahmen bis zu einem gewissen Grad verhindern."}],"author":[{"first_name":"Christoph","last_name":"Sorge","full_name":"Sorge, Christoph"},{"first_name":"Ronald","full_name":"Petrlic, Ronald","last_name":"Petrlic"}],"date_created":"2017-10-17T12:42:17Z","date_updated":"2022-01-06T07:01:02Z","title":"Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen","has_accepted_license":"1","citation":{"ama":"Sorge C, Petrlic R. Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen. In: <i>Tagungsband Des 17. Internationalen Rechtsinformatik Symposions</i>. ; 2014.","chicago":"Sorge, Christoph, and Ronald Petrlic. “Datenschutz Im Future Internet: Rechtliche Aspekte Und Technische Maßnahmen.” In <i>Tagungsband Des 17. Internationalen Rechtsinformatik Symposions</i>, 2014.","ieee":"C. Sorge and R. Petrlic, “Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen,” in <i>Tagungsband des 17. Internationalen Rechtsinformatik Symposions</i>, 2014.","short":"C. Sorge, R. Petrlic, in: Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.","mla":"Sorge, Christoph, and Ronald Petrlic. “Datenschutz Im Future Internet: Rechtliche Aspekte Und Technische Maßnahmen.” <i>Tagungsband Des 17. Internationalen Rechtsinformatik Symposions</i>, 2014.","bibtex":"@inproceedings{Sorge_Petrlic_2014, title={Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen}, booktitle={Tagungsband des 17. Internationalen Rechtsinformatik Symposions}, author={Sorge, Christoph and Petrlic, Ronald}, year={2014} }","apa":"Sorge, C., &#38; Petrlic, R. (2014). Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen. In <i>Tagungsband des 17. Internationalen Rechtsinformatik Symposions</i>."},"year":"2014"},{"citation":{"ama":"Blömer J, Liske G. Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions. 2014.","chicago":"Blömer, Johannes, and Gennadij Liske. “Constructing CCA-Secure Predicate Encapsulation Schemes from CPA-Secure Schemes and Universal One-Way Hash Functions.” Universität Paderborn, 2014.","ieee":"J. Blömer and G. Liske, “Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions.” Universität Paderborn, 2014.","mla":"Blömer, Johannes, and Gennadij Liske. <i>Constructing CCA-Secure Predicate Encapsulation Schemes from CPA-Secure Schemes and Universal One-Way Hash Functions</i>. Universität Paderborn, 2014.","short":"J. Blömer, G. Liske, (2014).","bibtex":"@article{Blömer_Liske_2014, title={Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions}, publisher={Universität Paderborn}, author={Blömer, Johannes and Liske, Gennadij}, year={2014} }","apa":"Blömer, J., &#38; Liske, G. (2014). Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions. Universität Paderborn."},"year":"2014","has_accepted_license":"1","main_file_link":[{"url":"https://eprint.iacr.org/2014/511.pdf","open_access":"1"}],"title":"Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions","date_created":"2017-10-17T12:42:18Z","author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Gennadij","full_name":"Liske, Gennadij","last_name":"Liske"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:03Z","oa":"1","status":"public","file":[{"date_updated":"2018-03-16T11:28:34Z","date_created":"2018-03-16T11:28:34Z","creator":"florida","file_size":377945,"file_name":"442-P-KEM.pdf","access_level":"closed","file_id":"1351","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"text":"We present a new transformation of chosen-plaintext secure predicate encryption schemes with public index into chosen-ciphertext secure schemes. Our construction requires only a universal one-way hash function and is selectively secure in the standard model. The transformation is not generic but can be applied to various existing schemes constructed from bilinear groups. Using common structural properties of these schemes we provide an efficient and simple transformation without overhead in form of one-time signatures or message authentication codes as required in the known generic transformations.","lang":"eng"}],"type":"preprint","file_date_updated":"2018-03-16T11:28:34Z","ddc":["000"],"department":[{"_id":"64"}],"user_id":"25078","_id":"442","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}]},{"ddc":["040"],"file_date_updated":"2018-03-16T11:27:04Z","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"446","user_id":"15504","department":[{"_id":"79"}],"abstract":[{"text":"This paper considers the problem of how to efficiently share a wireless medium which is subject to harsh external interference or even jamming. While this problem has already been studied intensively for simplistic single-hop or unit disk graph models, we make a leap forward and study MAC protocols for the SINR interference model (a.k.a. the physical model). We make two contributions. First, we introduce a new adversarial SINR model which captures a wide range of interference phenomena. Concretely, we consider a powerful, adaptive adversary which can jam nodes at arbitrary times and which is only limited by some energy budget. The second contribution of this paper is a distributed MAC protocol which provably achieves a constant competitive throughput in this environment: we show that, with high probability, the protocol ensures that a constant fraction of the non-blocked time periods is used for successful transmissions.","lang":"eng"}],"file":[{"date_updated":"2018-03-16T11:27:04Z","creator":"florida","date_created":"2018-03-16T11:27:04Z","file_size":378095,"file_id":"1348","access_level":"closed","file_name":"446-infocom14_01.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","type":"conference","publication":"Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)","title":"Competitive MAC under adversarial SINR","doi":"10.1109/INFOCOM.2014.6848224","date_updated":"2022-01-06T07:01:05Z","date_created":"2017-10-17T12:42:18Z","author":[{"full_name":"Ogierman, Adrian","last_name":"Ogierman","first_name":"Adrian"},{"last_name":"Richa","full_name":"Richa, Andrea W.","first_name":"Andrea W."},{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"},{"first_name":"Stefan","last_name":"Schmid","full_name":"Schmid, Stefan"},{"first_name":"Jin","full_name":"Zhang, Jin","last_name":"Zhang"}],"year":"2014","citation":{"ieee":"A. Ogierman, A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Competitive MAC under adversarial SINR,” in <i>Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)</i>, 2014, pp. 2751--2759.","chicago":"Ogierman, Adrian, Andrea W. Richa, Christian Scheideler, Stefan Schmid, and Jin Zhang. “Competitive MAC under Adversarial SINR.” In <i>Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)</i>, 2751--2759, 2014. <a href=\"https://doi.org/10.1109/INFOCOM.2014.6848224\">https://doi.org/10.1109/INFOCOM.2014.6848224</a>.","ama":"Ogierman A, Richa AW, Scheideler C, Schmid S, Zhang J. Competitive MAC under adversarial SINR. In: <i>Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)</i>. ; 2014:2751--2759. doi:<a href=\"https://doi.org/10.1109/INFOCOM.2014.6848224\">10.1109/INFOCOM.2014.6848224</a>","short":"A. Ogierman, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, in: Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759.","bibtex":"@inproceedings{Ogierman_Richa_Scheideler_Schmid_Zhang_2014, title={Competitive MAC under adversarial SINR}, DOI={<a href=\"https://doi.org/10.1109/INFOCOM.2014.6848224\">10.1109/INFOCOM.2014.6848224</a>}, booktitle={Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)}, author={Ogierman, Adrian and Richa, Andrea W. and Scheideler, Christian and Schmid, Stefan and Zhang, Jin}, year={2014}, pages={2751--2759} }","mla":"Ogierman, Adrian, et al. “Competitive MAC under Adversarial SINR.” <i>Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)</i>, 2014, pp. 2751--2759, doi:<a href=\"https://doi.org/10.1109/INFOCOM.2014.6848224\">10.1109/INFOCOM.2014.6848224</a>.","apa":"Ogierman, A., Richa, A. W., Scheideler, C., Schmid, S., &#38; Zhang, J. (2014). Competitive MAC under adversarial SINR. In <i>Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)</i> (pp. 2751--2759). <a href=\"https://doi.org/10.1109/INFOCOM.2014.6848224\">https://doi.org/10.1109/INFOCOM.2014.6848224</a>"},"page":"2751--2759","has_accepted_license":"1"},{"type":"mastersthesis","citation":{"ieee":"R. Mittendorf, <i>Advanced AES-key recovery from decayed RAM-dumps using multi-threading and FPGAs</i>. Universität Paderborn, 2014.","chicago":"Mittendorf, Robert. <i>Advanced AES-Key Recovery from Decayed RAM-Dumps Using Multi-Threading and FPGAs</i>. Universität Paderborn, 2014.","ama":"Mittendorf R. <i>Advanced AES-Key Recovery from Decayed RAM-Dumps Using Multi-Threading and FPGAs</i>. Universität Paderborn; 2014.","apa":"Mittendorf, R. (2014). <i>Advanced AES-key recovery from decayed RAM-dumps using multi-threading and FPGAs</i>. Universität Paderborn.","short":"R. Mittendorf, Advanced AES-Key Recovery from Decayed RAM-Dumps Using Multi-Threading and FPGAs, Universität Paderborn, 2014.","mla":"Mittendorf, Robert. <i>Advanced AES-Key Recovery from Decayed RAM-Dumps Using Multi-Threading and FPGAs</i>. Universität Paderborn, 2014.","bibtex":"@book{Mittendorf_2014, title={Advanced AES-key recovery from decayed RAM-dumps using multi-threading and FPGAs}, publisher={Universität Paderborn}, author={Mittendorf, Robert}, year={2014} }"},"status":"public","year":"2014","author":[{"first_name":"Robert","last_name":"Mittendorf","full_name":"Mittendorf, Robert"}],"date_created":"2017-10-17T12:42:21Z","user_id":"15504","publisher":"Universität Paderborn","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Subprojekt C2","_id":"14"},{"name":"SFB 901 - Project Area C","_id":"4"}],"date_updated":"2022-01-06T07:01:14Z","_id":"460","title":"Advanced AES-key recovery from decayed RAM-dumps using multi-threading and FPGAs"},{"file_date_updated":"2018-03-16T11:20:54Z","ddc":["040"],"user_id":"25078","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"43","name":"Securing the Financial Cloud"}],"_id":"463","file":[{"date_created":"2018-03-16T11:20:54Z","creator":"florida","date_updated":"2018-03-16T11:20:54Z","access_level":"closed","file_id":"1336","file_name":"463-FDTC14.pdf","file_size":437518,"content_type":"application/pdf","relation":"main_file","success":1}],"status":"public","abstract":[{"text":"Several fault attacks against pairing-based cryptography have been described theoretically in recent years. Interestingly, none of these have been practically evaluated. We accomplished this task and prove that fault attacks against pairing-based cryptography are indeed possible and are even practical — thus posing a serious threat. Moreover, we successfully conducted a second-order fault attack against an open source implementation of the eta pairing on an AVR XMEGA A1. We injected the first fault into the computation of the Miller Algorithm and applied the second fault to skip the final exponentiation completely. We introduce a low-cost setup that allowed us to generate multiple independent faults in one computation. The setup implements these faults by clock glitches which induce instruction skips. With this setup we conducted the first practical fault attack against a complete pairing computation.","lang":"eng"}],"type":"conference","publication":"Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)","doi":"10.1109/FDTC.2014.22","title":"A Practical Second-Order Fault Attack against a Real-World Pairing Implementation","author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Ricardo","full_name":"Gomes da Silva, Ricardo","last_name":"Gomes da Silva"},{"full_name":"Günther, Peter","last_name":"Günther","first_name":"Peter"},{"last_name":"Krämer","full_name":"Krämer, Juliane","first_name":"Juliane"},{"full_name":"Seifert, Jean-Pierre","last_name":"Seifert","first_name":"Jean-Pierre"}],"date_created":"2017-10-17T12:42:22Z","date_updated":"2022-01-06T07:01:16Z","citation":{"apa":"Blömer, J., Gomes da Silva, R., Günther, P., Krämer, J., &#38; Seifert, J.-P. (2014). A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i> (pp. 123--136). <a href=\"https://doi.org/10.1109/FDTC.2014.22\">https://doi.org/10.1109/FDTC.2014.22</a>","short":"J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.","mla":"Blömer, Johannes, et al. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 2014, pp. 123--136, doi:<a href=\"https://doi.org/10.1109/FDTC.2014.22\">10.1109/FDTC.2014.22</a>.","bibtex":"@inproceedings{Blömer_Gomes da Silva_Günther_Krämer_Seifert_2014, title={A Practical Second-Order Fault Attack against a Real-World Pairing Implementation}, DOI={<a href=\"https://doi.org/10.1109/FDTC.2014.22\">10.1109/FDTC.2014.22</a>}, booktitle={Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)}, author={Blömer, Johannes and Gomes da Silva, Ricardo and Günther, Peter and Krämer, Juliane and Seifert, Jean-Pierre}, year={2014}, pages={123--136} }","chicago":"Blömer, Johannes, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, and Jean-Pierre Seifert. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” In <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 123--136, 2014. <a href=\"https://doi.org/10.1109/FDTC.2014.22\">https://doi.org/10.1109/FDTC.2014.22</a>.","ieee":"J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, and J.-P. Seifert, “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation,” in <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>, 2014, pp. 123--136.","ama":"Blömer J, Gomes da Silva R, Günther P, Krämer J, Seifert J-P. A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In: <i>Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC)</i>. ; 2014:123--136. doi:<a href=\"https://doi.org/10.1109/FDTC.2014.22\">10.1109/FDTC.2014.22</a>"},"page":"123--136","year":"2014","has_accepted_license":"1"},{"publication":"Computer Law & Security Review","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-15T14:03:20Z","creator":"florida","date_created":"2018-03-15T14:03:20Z","file_size":194634,"access_level":"closed","file_name":"479-Sorge-Legal-Classification2013.pdf","file_id":"1323"}],"abstract":[{"text":"Identity-based cryptography has attracted attention in the cryptographic research community in recent years. Despite the importance of cryptographic schemes for applications in business and law, the legal implications of identity-based cryptography have not yet been discussed. We investigate how identity-based signatures fit into the legal framework. We focus on the European Signature Directive, but also take the UNCITRAL Model Law on Electronic Signatures into account. In contrast to previous assumptions, identity-based signature schemes can, in principle, be used even for qualified electronic signatures, which can replace handwritten signatures in the member states of the European Union. We derive requirements to be taken into account in the development of future identity-based signature schemes.","lang":"eng"}],"ddc":["040"],"issue":"2","year":"2014","date_created":"2017-10-17T12:42:25Z","publisher":"Elsevier","title":"The Legal Classification of Identity-Based Signatures","type":"journal_article","status":"public","user_id":"477","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"479","file_date_updated":"2018-03-15T14:03:20Z","has_accepted_license":"1","citation":{"apa":"Sorge, C. (2014). The Legal Classification of Identity-Based Signatures. <i>Computer Law &#38; Security Review</i>, <i>30</i>(2), 126–136. <a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">https://doi.org/10.1016/j.clsr.2014.01.002</a>","mla":"Sorge, Christoph. “The Legal Classification of Identity-Based Signatures.” <i>Computer Law &#38; Security Review</i>, vol. 30, no. 2, Elsevier, 2014, pp. 126–36, doi:<a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">10.1016/j.clsr.2014.01.002</a>.","bibtex":"@article{Sorge_2014, title={The Legal Classification of Identity-Based Signatures}, volume={30}, DOI={<a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">10.1016/j.clsr.2014.01.002</a>}, number={2}, journal={Computer Law &#38; Security Review}, publisher={Elsevier}, author={Sorge, Christoph}, year={2014}, pages={126–136} }","short":"C. Sorge, Computer Law &#38; Security Review 30 (2014) 126–136.","chicago":"Sorge, Christoph. “The Legal Classification of Identity-Based Signatures.” <i>Computer Law &#38; Security Review</i> 30, no. 2 (2014): 126–36. <a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">https://doi.org/10.1016/j.clsr.2014.01.002</a>.","ieee":"C. Sorge, “The Legal Classification of Identity-Based Signatures,” <i>Computer Law &#38; Security Review</i>, vol. 30, no. 2, pp. 126–136, 2014.","ama":"Sorge C. The Legal Classification of Identity-Based Signatures. <i>Computer Law &#38; Security Review</i>. 2014;30(2):126-136. doi:<a href=\"https://doi.org/10.1016/j.clsr.2014.01.002\">10.1016/j.clsr.2014.01.002</a>"},"intvolume":"        30","page":"126-136","author":[{"first_name":"Christoph","last_name":"Sorge","full_name":"Sorge, Christoph"}],"volume":30,"date_updated":"2022-01-06T07:01:22Z","doi":"10.1016/j.clsr.2014.01.002"},{"type":"conference","publication":"Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet","abstract":[{"text":"Service matching approaches determine to what extent a provided service matches a requester's requirements. This process is based on service specifications describing functional (e.g., signatures) as well as non-functional properties (e.g., privacy policies). However, we cannot expect service specifications to be complete as providers do not want to share all details of their services' implementation. Moreover, creating complete specifications requires much effort. In this paper, we propose a novel service matching approach taking into account a service's signatures and privacy policies. In particular, our approach applies fuzzy matching techniques that are able to deal with incomplete service specifications. As a benefit, decision-making based on matching results is improved and service matching becomes better applicable in practice.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-03-16T11:38:13Z","creator":"florida","date_updated":"2018-03-16T11:38:13Z","file_id":"1367","file_name":"401-WAS4FI2014.pdf","access_level":"closed","file_size":396656}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"401","user_id":"477","series_title":"Communications in Computer and Information Science","department":[{"_id":"66"},{"_id":"76"}],"ddc":["040"],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-16T11:38:13Z","has_accepted_license":"1","year":"2014","citation":{"apa":"Platenius, M. C., Arifulina, S., Petrlic, R., &#38; Schäfer, W. (2014). Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching. In <i>Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet</i> (pp. 6–17). <a href=\"https://doi.org/10.1007/978-3-319-14886-1_2\">https://doi.org/10.1007/978-3-319-14886-1_2</a>","short":"M.C. Platenius, S. Arifulina, R. Petrlic, W. Schäfer, in: Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17.","mla":"Platenius, Marie Christin, et al. “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.” <i>Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet</i>, 2014, pp. 6–17, doi:<a href=\"https://doi.org/10.1007/978-3-319-14886-1_2\">10.1007/978-3-319-14886-1_2</a>.","bibtex":"@inproceedings{Platenius_Arifulina_Petrlic_Schäfer_2014, series={Communications in Computer and Information Science}, title={Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-14886-1_2\">10.1007/978-3-319-14886-1_2</a>}, booktitle={Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet}, author={Platenius, Marie Christin and Arifulina, Svetlana and Petrlic, Ronald and Schäfer, Wilhelm}, year={2014}, pages={6–17}, collection={Communications in Computer and Information Science} }","ama":"Platenius MC, Arifulina S, Petrlic R, Schäfer W. Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching. In: <i>Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet</i>. Communications in Computer and Information Science. ; 2014:6-17. doi:<a href=\"https://doi.org/10.1007/978-3-319-14886-1_2\">10.1007/978-3-319-14886-1_2</a>","chicago":"Platenius, Marie Christin, Svetlana Arifulina, Ronald Petrlic, and Wilhelm Schäfer. “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.” In <i>Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet</i>, 6–17. Communications in Computer and Information Science, 2014. <a href=\"https://doi.org/10.1007/978-3-319-14886-1_2\">https://doi.org/10.1007/978-3-319-14886-1_2</a>.","ieee":"M. C. Platenius, S. Arifulina, R. Petrlic, and W. Schäfer, “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching,” in <i>Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet</i>, 2014, pp. 6–17."},"page":"6-17","date_updated":"2022-01-06T07:00:07Z","author":[{"first_name":"Marie Christin","last_name":"Platenius","full_name":"Platenius, Marie Christin"},{"full_name":"Arifulina, Svetlana","last_name":"Arifulina","first_name":"Svetlana"},{"first_name":"Ronald","last_name":"Petrlic","full_name":"Petrlic, Ronald"},{"last_name":"Schäfer","full_name":"Schäfer, Wilhelm","first_name":"Wilhelm"}],"date_created":"2017-10-17T12:42:10Z","title":"Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching","doi":"10.1007/978-3-319-14886-1_2"},{"title":"Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services","date_created":"2017-10-17T12:42:11Z","publisher":"IARIA","year":"2014","issue":"3&4","language":[{"iso":"eng"}],"ddc":["040"],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"florida","date_created":"2018-03-16T11:34:28Z","date_updated":"2018-03-16T11:34:28Z","file_name":"410-intsys_v7_n34_2014_18.pdf","access_level":"closed","file_id":"1362","file_size":2590608}],"abstract":[{"lang":"eng","text":"One goal of service-oriented computing is to realize future markets of composed services. In such markets, service providers offer services that can be ﬂexibly combined with each other. However, although crucial for decision-making, market participants are usually not able to individually estimate the quality of traded services in advance. To overcome this problem, we present a conceptual design for a reputation system that collects and processes user feedback on transactions, and provides this information as a signal for quality to participants in the market. Based on our proposed concept, we describe the incorporation of reputation information into distinct decision-making processes that are crucial in such service markets. In this context, we present a fuzzy service matching approach that takes reputation information into account. Furthermore, we introduce an adaptive service composition approach, and investigate the impact of exchanging immediate user feedback by reputation information. Last but not least, we describe the importance of reputation information for economic decisions of different market participants. The overall output of this paper is a comprehensive view on managing and exploiting reputation information in markets of composed services using the example of On-The-Fly Computing."}],"publication":"International Journal On Advances in Intelligent Systems (IntSys)","main_file_link":[{"url":"http://www.iariajournals.org/intelligent_systems/intsys_v7_n34_2014_paged.pdf"}],"author":[{"last_name":"Jungmann","full_name":"Jungmann, Alexander","first_name":"Alexander"},{"first_name":"Sonja","last_name":"Brangewitz","full_name":"Brangewitz, Sonja"},{"last_name":"Petrlic","full_name":"Petrlic, Ronald","first_name":"Ronald"},{"full_name":"Platenius, Marie Christin","last_name":"Platenius","first_name":"Marie Christin"}],"volume":7,"date_updated":"2022-01-06T07:00:17Z","citation":{"bibtex":"@article{Jungmann_Brangewitz_Petrlic_Platenius_2014, title={Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services}, volume={7}, number={3&#38;4}, journal={International Journal On Advances in Intelligent Systems (IntSys)}, publisher={IARIA}, author={Jungmann, Alexander and Brangewitz, Sonja and Petrlic, Ronald and Platenius, Marie Christin}, year={2014}, pages={572--594} }","short":"A. Jungmann, S. Brangewitz, R. Petrlic, M.C. Platenius, International Journal On Advances in Intelligent Systems (IntSys) 7 (2014) 572--594.","mla":"Jungmann, Alexander, et al. “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.” <i>International Journal On Advances in Intelligent Systems (IntSys)</i>, vol. 7, no. 3&#38;4, IARIA, 2014, pp. 572--594.","apa":"Jungmann, A., Brangewitz, S., Petrlic, R., &#38; Platenius, M. C. (2014). Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services. <i>International Journal On Advances in Intelligent Systems (IntSys)</i>, <i>7</i>(3&#38;4), 572--594.","ieee":"A. Jungmann, S. Brangewitz, R. Petrlic, and M. C. Platenius, “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services,” <i>International Journal On Advances in Intelligent Systems (IntSys)</i>, vol. 7, no. 3&#38;4, pp. 572--594, 2014.","chicago":"Jungmann, Alexander, Sonja Brangewitz, Ronald Petrlic, and Marie Christin Platenius. “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.” <i>International Journal On Advances in Intelligent Systems (IntSys)</i> 7, no. 3&#38;4 (2014): 572--594.","ama":"Jungmann A, Brangewitz S, Petrlic R, Platenius MC. Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services. <i>International Journal On Advances in Intelligent Systems (IntSys)</i>. 2014;7(3&#38;4):572--594."},"intvolume":"         7","page":"572--594","has_accepted_license":"1","file_date_updated":"2018-03-16T11:34:28Z","user_id":"65453","department":[{"_id":"205"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"10","name":"SFB 901 - Subprojekt B2"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"410","status":"public","type":"journal_article"},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"Securing the Financial Cloud","_id":"43"}],"_id":"414","user_id":"25078","department":[{"_id":"64"}],"type":"mastersthesis","status":"public","date_updated":"2022-01-06T07:00:23Z","publisher":"Universität Paderborn","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"author":[{"last_name":"Jochheim","full_name":"Jochheim, Janek","first_name":"Janek"}],"date_created":"2017-10-17T12:42:12Z","title":"Hiding software components using functional encryption","year":"2014","citation":{"ama":"Jochheim J. <i>Hiding Software Components Using Functional Encryption</i>. Universität Paderborn; 2014.","ieee":"J. Jochheim, <i>Hiding software components using functional encryption</i>. Universität Paderborn, 2014.","chicago":"Jochheim, Janek. <i>Hiding Software Components Using Functional Encryption</i>. Universität Paderborn, 2014.","bibtex":"@book{Jochheim_2014, title={Hiding software components using functional encryption}, publisher={Universität Paderborn}, author={Jochheim, Janek}, year={2014} }","mla":"Jochheim, Janek. <i>Hiding Software Components Using Functional Encryption</i>. Universität Paderborn, 2014.","short":"J. Jochheim, Hiding Software Components Using Functional Encryption, Universität Paderborn, 2014.","apa":"Jochheim, J. (2014). <i>Hiding software components using functional encryption</i>. Universität Paderborn."}},{"citation":{"ama":"Bemmann P. <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn; 2014.","chicago":"Bemmann, Pascal. <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn, 2014.","ieee":"P. Bemmann, <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn, 2014.","short":"P. Bemmann, Group Signature Schemes with Strong Exculpability, Universität Paderborn, 2014.","bibtex":"@book{Bemmann_2014, title={Group Signature Schemes with Strong Exculpability}, publisher={Universität Paderborn}, author={Bemmann, Pascal}, year={2014} }","mla":"Bemmann, Pascal. <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn, 2014.","apa":"Bemmann, P. (2014). <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn."},"year":"2014","title":"Group Signature Schemes with Strong Exculpability","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2017-10-17T12:42:13Z","author":[{"first_name":"Pascal","id":"32571","full_name":"Bemmann, Pascal","last_name":"Bemmann"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:00:26Z","status":"public","type":"bachelorsthesis","user_id":"25078","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"416"},{"citation":{"bibtex":"@book{Lippert_2014, title={Fujisaki-Okamoto Transformation}, publisher={Universität Paderborn}, author={Lippert, Jan}, year={2014} }","short":"J. Lippert, Fujisaki-Okamoto Transformation, Universität Paderborn, 2014.","mla":"Lippert, Jan. <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn, 2014.","apa":"Lippert, J. (2014). <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn.","ieee":"J. Lippert, <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn, 2014.","chicago":"Lippert, Jan. <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn, 2014.","ama":"Lippert J. <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn; 2014."},"year":"2014","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2017-10-17T12:42:14Z","author":[{"first_name":"Jan","last_name":"Lippert","full_name":"Lippert, Jan"}],"date_updated":"2022-01-06T07:00:36Z","publisher":"Universität Paderborn","title":"Fujisaki-Okamoto Transformation","type":"bachelorsthesis","status":"public","department":[{"_id":"64"}],"user_id":"25078","_id":"421","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}]},{"type":"bachelorsthesis","status":"public","user_id":"15504","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"438","citation":{"mla":"Kokoschka, Andreas. <i>Designing an Anonymous and Secure Reputation System Using a Group Signature Variant</i>. Universität Paderborn, 2014.","short":"A. Kokoschka, Designing an Anonymous and Secure Reputation System Using a Group Signature Variant, Universität Paderborn, 2014.","bibtex":"@book{Kokoschka_2014, title={Designing an Anonymous and Secure Reputation System Using a Group Signature Variant}, publisher={Universität Paderborn}, author={Kokoschka, Andreas}, year={2014} }","apa":"Kokoschka, A. (2014). <i>Designing an Anonymous and Secure Reputation System Using a Group Signature Variant</i>. Universität Paderborn.","ama":"Kokoschka A. <i>Designing an Anonymous and Secure Reputation System Using a Group Signature Variant</i>. Universität Paderborn; 2014.","ieee":"A. Kokoschka, <i>Designing an Anonymous and Secure Reputation System Using a Group Signature Variant</i>. Universität Paderborn, 2014.","chicago":"Kokoschka, Andreas. <i>Designing an Anonymous and Secure Reputation System Using a Group Signature Variant</i>. Universität Paderborn, 2014."},"year":"2014","author":[{"first_name":"Andreas","last_name":"Kokoschka","full_name":"Kokoschka, Andreas"}],"date_created":"2017-10-17T12:42:17Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:00Z","title":"Designing an Anonymous and Secure Reputation System Using a Group Signature Variant"}]
