[{"citation":{"bibtex":"@book{Tezer_2013, title={Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen}, publisher={Universität Paderborn}, author={Tezer, Alina}, year={2013} }","mla":"Tezer, Alina. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.","short":"A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013.","apa":"Tezer, A. (2013). <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn.","ama":"Tezer A. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn; 2013.","ieee":"A. Tezer, <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.","chicago":"Tezer, Alina. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013."},"year":"2013","date_created":"2017-10-17T12:42:23Z","author":[{"first_name":"Alina","last_name":"Tezer","full_name":"Tezer, Alina"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_updated":"2022-01-06T07:01:19Z","publisher":"Universität Paderborn","title":"Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen","type":"bachelorsthesis","status":"public","user_id":"477","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"Securing the Financial Cloud","_id":"43"}],"_id":"471","language":[{"iso":"ger"}]},{"status":"public","file":[{"file_size":286049,"access_level":"closed","file_name":"473-drm-general-1-camera-ready.pdf","file_id":"1330","date_updated":"2018-03-16T11:17:30Z","creator":"florida","date_created":"2018-03-16T11:17:30Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"editor":[{"first_name":"Lingyu","full_name":"Wang, Lingyu","last_name":"Wang"},{"last_name":"Shafiq","full_name":"Shafiq, Basit","first_name":"Basit"}],"abstract":[{"text":"We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme. (Roaming) users buy content licenses from a content provider and execute it at any nearby content distributor. Our approach, which does not need any trusted third party - in contrast to most related work on privacy-preserving DRM - is based on a re-encryption scheme that runs on any mobile Android device. Only a minor security-critical part needs to be performed on the device's smartcard which could, for instance, be a SIM card.","lang":"eng"}],"publication":"Data and Applications Security and Privacy XXVII","type":"conference","file_date_updated":"2018-03-16T11:17:30Z","ddc":["040"],"series_title":"Lecture Notes in Computer Science","user_id":"15504","_id":"473","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"page":"289-296","citation":{"bibtex":"@inproceedings{Petrlic_Sekula_2013, series={Lecture Notes in Computer Science}, title={Unlinkable content playbacks in a multiparty DRM system}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">10.1007/978-3-642-39256-6_21</a>}, booktitle={Data and Applications Security and Privacy XXVII}, author={Petrlic, Ronald and Sekula, Stephan}, editor={Wang, Lingyu and Shafiq, BasitEditors}, year={2013}, pages={289–296}, collection={Lecture Notes in Computer Science} }","mla":"Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” <i>Data and Applications Security and Privacy XXVII</i>, edited by Lingyu Wang and Basit Shafiq, 2013, pp. 289–96, doi:<a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">10.1007/978-3-642-39256-6_21</a>.","short":"R. Petrlic, S. Sekula, in: L. Wang, B. Shafiq (Eds.), Data and Applications Security and Privacy XXVII, 2013, pp. 289–296.","apa":"Petrlic, R., &#38; Sekula, S. (2013). Unlinkable content playbacks in a multiparty DRM system. In L. Wang &#38; B. Shafiq (Eds.), <i>Data and Applications Security and Privacy XXVII</i> (pp. 289–296). <a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">https://doi.org/10.1007/978-3-642-39256-6_21</a>","ama":"Petrlic R, Sekula S. Unlinkable content playbacks in a multiparty DRM system. In: Wang L, Shafiq B, eds. <i>Data and Applications Security and Privacy XXVII</i>. Lecture Notes in Computer Science. ; 2013:289-296. doi:<a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">10.1007/978-3-642-39256-6_21</a>","ieee":"R. Petrlic and S. Sekula, “Unlinkable content playbacks in a multiparty DRM system,” in <i>Data and Applications Security and Privacy XXVII</i>, 2013, pp. 289–296.","chicago":"Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” In <i>Data and Applications Security and Privacy XXVII</i>, edited by Lingyu Wang and Basit Shafiq, 289–96. Lecture Notes in Computer Science, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39256-6_21\">https://doi.org/10.1007/978-3-642-39256-6_21</a>."},"year":"2013","has_accepted_license":"1","doi":"10.1007/978-3-642-39256-6_21","title":"Unlinkable content playbacks in a multiparty DRM system","date_created":"2017-10-17T12:42:24Z","author":[{"first_name":"Ronald","full_name":"Petrlic, Ronald","last_name":"Petrlic"},{"first_name":"Stephan","last_name":"Sekula","full_name":"Sekula, Stephan"}],"date_updated":"2022-01-06T07:01:19Z"},{"year":"2013","citation":{"apa":"Joshi, N., &#38; Petrlic, R. (2013). Towards practical privacy-preserving Digital Rights Management for Cloud Computing. In <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i> (pp. 259–264). <a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">https://doi.org/10.1109/CCNC.2013.6488456</a>","short":"N. Joshi, R. Petrlic, in: Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC), 2013, pp. 259–264.","mla":"Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i>, 2013, pp. 259–64, doi:<a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">10.1109/CCNC.2013.6488456</a>.","bibtex":"@inproceedings{Joshi_Petrlic_2013, title={Towards practical privacy-preserving Digital Rights Management for Cloud Computing}, DOI={<a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">10.1109/CCNC.2013.6488456</a>}, booktitle={Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)}, author={Joshi, Nakul and Petrlic, Ronald}, year={2013}, pages={259–264} }","ieee":"N. Joshi and R. Petrlic, “Towards practical privacy-preserving Digital Rights Management for Cloud Computing,” in <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i>, 2013, pp. 259–264.","chicago":"Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” In <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i>, 259–64, 2013. <a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">https://doi.org/10.1109/CCNC.2013.6488456</a>.","ama":"Joshi N, Petrlic R. Towards practical privacy-preserving Digital Rights Management for Cloud Computing. In: <i>Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i>. ; 2013:259-264. doi:<a href=\"https://doi.org/10.1109/CCNC.2013.6488456\">10.1109/CCNC.2013.6488456</a>"},"page":"259-264","has_accepted_license":"1","title":"Towards practical privacy-preserving Digital Rights Management for Cloud Computing","doi":"10.1109/CCNC.2013.6488456","date_updated":"2022-01-06T07:01:21Z","author":[{"first_name":"Nakul","full_name":"Joshi, Nakul","last_name":"Joshi"},{"first_name":"Ronald","last_name":"Petrlic","full_name":"Petrlic, Ronald"}],"date_created":"2017-10-17T12:42:24Z","abstract":[{"lang":"eng","text":"We propose a privacy-preserving digital rights management scheme for (future) cloud computing. Users buy software from software providers and execute it at computing centers. Our solution allows software providers to provide different license models, like execute at most n-times models. Users’ anonymity and unlinkability of actions are preserved and thus, profile building is not even possible under (a) pseudonym. Privacy protection in the honest-but-curious model is achieved by combining ring signatures with an anonymous recipient scheme.We employ secret sharing in a unique manner that allows the software provider to expose the user’s identity if the user commits fraud, e.g. by exceeding the execution limit n."}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-03-16T11:16:29Z","creator":"florida","date_updated":"2018-03-16T11:16:29Z","access_level":"closed","file_id":"1328","file_name":"475-privacy-drm-cloud-5.pdf","file_size":370473}],"status":"public","type":"conference","publication":"Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC)","ddc":["040"],"file_date_updated":"2018-03-16T11:16:29Z","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"475","user_id":"15504"},{"language":[{"iso":"ger"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}],"_id":"486","user_id":"477","department":[{"_id":"64"}],"status":"public","type":"bachelorsthesis","title":"Seitenkanalresistenz paarungsbasierter Kryptographie","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:27Z","author":[{"first_name":"Oliver","full_name":"Otte, Oliver","last_name":"Otte"}],"date_created":"2017-10-17T12:42:27Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"year":"2013","citation":{"ama":"Otte O. <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn; 2013.","chicago":"Otte, Oliver. <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn, 2013.","ieee":"O. Otte, <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn, 2013.","apa":"Otte, O. (2013). <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn.","short":"O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie, Universität Paderborn, 2013.","bibtex":"@book{Otte_2013, title={Seitenkanalresistenz paarungsbasierter Kryptographie}, publisher={Universität Paderborn}, author={Otte, Oliver}, year={2013} }","mla":"Otte, Oliver. <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn, 2013."}},{"_id":"487","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"64"}],"user_id":"27207","ddc":["000"],"file_date_updated":"2018-06-29T09:56:54Z","type":"bachelorsthesis","urn":"4875","status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_name":"thesis_jbobolz_final.pdf","access_level":"open_access","file_id":"2346","file_size":874286,"creator":"jbobolz","date_created":"2018-04-13T11:42:08Z","date_updated":"2018-06-29T09:56:54Z"}],"date_updated":"2022-01-06T07:01:28Z","oa":"1","publisher":"Universität Paderborn","date_created":"2017-10-17T12:42:27Z","author":[{"first_name":"Jan","id":"27207","full_name":"Bobolz, Jan","last_name":"Bobolz"}],"title":"Security Proofs for Pairing-Based Cryptography in the Generic Group Model","has_accepted_license":"1","year":"2013","citation":{"chicago":"Bobolz, Jan. <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn, 2013.","ieee":"J. Bobolz, <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn, 2013.","ama":"Bobolz J. <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn; 2013.","bibtex":"@book{Bobolz_2013, title={Security Proofs for Pairing-Based Cryptography in the Generic Group Model}, publisher={Universität Paderborn}, author={Bobolz, Jan}, year={2013} }","short":"J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model, Universität Paderborn, 2013.","mla":"Bobolz, Jan. <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn, 2013.","apa":"Bobolz, J. (2013). <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn."}},{"has_accepted_license":"1","year":"2013","citation":{"bibtex":"@inproceedings{Blömer_Günther_Krummel_2013, title={Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study}, booktitle={Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker}, year={2013}, pages={98–105} }","short":"J. Blömer, P. Günther, V. Krummel, in: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.","mla":"Blömer, Johannes, et al. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2013, pp. 98–105.","apa":"Blömer, J., Günther, P., &#38; Krummel, V. (2013). Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (pp. 98–105).","ama":"Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In: <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. ; 2013:98-105.","chicago":"Blömer, Johannes, Peter Günther, and Volker Krummel. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” In <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 98–105, 2013.","ieee":"J. Blömer, P. Günther, and V. Krummel, “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study,” in <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2013, pp. 98–105."},"page":"98-105","date_updated":"2022-01-06T07:01:28Z","date_created":"2017-10-17T12:42:27Z","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"first_name":"Peter","full_name":"Günther, Peter","last_name":"Günther"},{"full_name":"Krummel, Volker","last_name":"Krummel","first_name":"Volker"}],"title":"Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study","type":"conference","publication":"Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)","abstract":[{"lang":"eng","text":"Unattended systems are key ingredients of various critical infrastruc-tures like networks of self service terminals or automated teller machines.For cost and efficiency reasons they should mostly run autonomously.Unattended systems are attractive and lucrative targets for various kindsof attacks, including attacks on the integrity of their components and thecommunication between components. In this paper, we propose a gen-eral cryptographic framework to protect unattended systems. We alsodemonstrate that instantiating the framework with techniques from iden-tity based cryptography is particularly well-suited to efficiently secureunattended systems."}],"file":[{"date_updated":"2018-03-15T13:46:52Z","creator":"florida","date_created":"2018-03-15T13:46:52Z","file_size":301962,"access_level":"closed","file_name":"488-MACIS13.pdf","file_id":"1317","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"488","user_id":"477","department":[{"_id":"64"}],"ddc":["040"],"file_date_updated":"2018-03-15T13:46:52Z"},{"user_id":"15504","department":[{"_id":"79"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"519","file_date_updated":"2018-03-15T10:38:34Z","ddc":["040"],"type":"conference","publication":"Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)","file":[{"file_size":554618,"access_level":"closed","file_name":"519-iris-spaa2013_01.pdf","file_id":"1299","date_updated":"2018-03-15T10:38:34Z","date_created":"2018-03-15T10:38:34Z","creator":"florida","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","abstract":[{"lang":"eng","text":"In this work we present the first scalable distributed information system,i.e., a system with low storage overhead, that is provably robust againstDenial-of-Service (DoS) attacks by a current insider. We allow acurrent insider to have complete knowledge about the information systemand to have the power to block any \\epsilon-fraction of its serversby a DoS-attack, where \\epsilon can be chosen up to a constant. The taskof the system is to serve any collection of lookup requests with at most oneper non-blocked server in an efficient way despite this attack. Previously,scalable solutions were only known for DoS-attacks of past insiders, where apast insider only has complete knowledge about some past time pointt_0 of the information system. Scheideler et al. (DISC 2007, SPAA 2009) showedthat in this case it is possible to design an information system so that anyinformation that was inserted or last updated after t_0 is safe against a DoS-attack. But their constructions would not work at all for a current insider. The key idea behindour IRIS system is to make extensive use of coding. More precisely, we presenttwo alternative distributed coding strategies with an at most logarithmicstorage overhead that can handle up to a constant fraction of blocked servers."}],"author":[{"first_name":"Martina","last_name":"Eikel","full_name":"Eikel, Martina"},{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"}],"date_created":"2017-10-17T12:42:33Z","date_updated":"2022-01-06T07:01:42Z","doi":"10.1145/2486159.2486186","title":"IRIS: A Robust Information System Against Insider DoS-Attacks","has_accepted_license":"1","citation":{"chicago":"Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS-Attacks.” In <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 119–29, 2013. <a href=\"https://doi.org/10.1145/2486159.2486186\">https://doi.org/10.1145/2486159.2486186</a>.","ieee":"M. Eikel and C. Scheideler, “IRIS: A Robust Information System Against Insider DoS-Attacks,” in <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 2013, pp. 119–129.","ama":"Eikel M, Scheideler C. IRIS: A Robust Information System Against Insider DoS-Attacks. In: <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. ; 2013:119-129. doi:<a href=\"https://doi.org/10.1145/2486159.2486186\">10.1145/2486159.2486186</a>","mla":"Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS-Attacks.” <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 2013, pp. 119–29, doi:<a href=\"https://doi.org/10.1145/2486159.2486186\">10.1145/2486159.2486186</a>.","short":"M. Eikel, C. Scheideler, in: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 119–129.","bibtex":"@inproceedings{Eikel_Scheideler_2013, title={IRIS: A Robust Information System Against Insider DoS-Attacks}, DOI={<a href=\"https://doi.org/10.1145/2486159.2486186\">10.1145/2486159.2486186</a>}, booktitle={Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}, author={Eikel, Martina and Scheideler, Christian}, year={2013}, pages={119–129} }","apa":"Eikel, M., &#38; Scheideler, C. (2013). IRIS: A Robust Information System Against Insider DoS-Attacks. In <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i> (pp. 119–129). <a href=\"https://doi.org/10.1145/2486159.2486186\">https://doi.org/10.1145/2486159.2486186</a>"},"page":"119-129","year":"2013"},{"year":"2013","citation":{"ieee":"H. Riebler, <i>Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs</i>. Universität Paderborn, 2013.","chicago":"Riebler, Heinrich. <i>Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs</i>. Universität Paderborn, 2013.","ama":"Riebler H. <i>Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs</i>. Universität Paderborn; 2013.","mla":"Riebler, Heinrich. <i>Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs</i>. Universität Paderborn, 2013.","bibtex":"@book{Riebler_2013, title={Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs}, publisher={Universität Paderborn}, author={Riebler, Heinrich}, year={2013} }","short":"H. Riebler, Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs, Universität Paderborn, 2013.","apa":"Riebler, H. (2013). <i>Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs</i>. Universität Paderborn."},"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:46Z","date_created":"2017-10-17T12:42:34Z","author":[{"last_name":"Riebler","full_name":"Riebler, Heinrich","id":"8961","first_name":"Heinrich"}],"title":"Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs","type":"mastersthesis","status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"14","name":"SFB 901 - Subprojekt C2"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"521","user_id":"477","department":[{"_id":"27"},{"_id":"518"}],"keyword":["coldboot"],"language":[{"iso":"ger"}]},{"date_updated":"2022-01-06T07:01:49Z","publisher":"Universität Paderborn","author":[{"first_name":"Sascha","last_name":"Lutters","full_name":"Lutters, Sascha"}],"date_created":"2017-10-17T12:42:35Z","title":"Entwurf eines datenschutzgerechten Reputationssystems","year":"2013","citation":{"ieee":"S. Lutters, <i>Entwurf eines datenschutzgerechten Reputationssystems</i>. Universität Paderborn, 2013.","chicago":"Lutters, Sascha. <i>Entwurf eines datenschutzgerechten Reputationssystems</i>. Universität Paderborn, 2013.","ama":"Lutters S. <i>Entwurf eines datenschutzgerechten Reputationssystems</i>. Universität Paderborn; 2013.","apa":"Lutters, S. (2013). <i>Entwurf eines datenschutzgerechten Reputationssystems</i>. Universität Paderborn.","bibtex":"@book{Lutters_2013, title={Entwurf eines datenschutzgerechten Reputationssystems}, publisher={Universität Paderborn}, author={Lutters, Sascha}, year={2013} }","mla":"Lutters, Sascha. <i>Entwurf eines datenschutzgerechten Reputationssystems</i>. Universität Paderborn, 2013.","short":"S. Lutters, Entwurf eines datenschutzgerechten Reputationssystems, Universität Paderborn, 2013."},"_id":"531","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"user_id":"477","language":[{"iso":"ger"}],"type":"mastersthesis","status":"public"},{"language":[{"iso":"ger"}],"title":"Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme","author":[{"last_name":"Hilleckes","full_name":"Hilleckes, Hendrik","first_name":"Hendrik"}],"date_created":"2017-10-17T12:42:36Z","user_id":"477","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"date_updated":"2022-01-06T07:01:49Z","publisher":"Universität Paderborn","_id":"532","citation":{"mla":"Hilleckes, Hendrik. <i>Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme</i>. Universität Paderborn, 2013.","short":"H. Hilleckes, Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme, Universität Paderborn, 2013.","bibtex":"@book{Hilleckes_2013, title={Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme}, publisher={Universität Paderborn}, author={Hilleckes, Hendrik}, year={2013} }","apa":"Hilleckes, H. (2013). <i>Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme</i>. Universität Paderborn.","chicago":"Hilleckes, Hendrik. <i>Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme</i>. Universität Paderborn, 2013.","ieee":"H. Hilleckes, <i>Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme</i>. Universität Paderborn, 2013.","ama":"Hilleckes H. <i>Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme</i>. Universität Paderborn; 2013."},"status":"public","year":"2013","type":"bachelorsthesis"},{"has_accepted_license":"1","citation":{"ama":"Blömer J, Liske G. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. 2013.","chicago":"Blömer, Johannes, and Gennadij Liske. “Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn, 2013.","ieee":"J. Blömer and G. Liske, “Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn, 2013.","mla":"Blömer, Johannes, and Gennadij Liske. <i>Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles</i>. Universität Paderborn, 2013.","bibtex":"@article{Blömer_Liske_2013, title={Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles}, publisher={Universität Paderborn}, author={Blömer, Johannes and Liske, Gennadij}, year={2013} }","short":"J. Blömer, G. Liske, (2013).","apa":"Blömer, J., &#38; Liske, G. (2013). Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. Universität Paderborn."},"year":"2013","date_created":"2017-10-17T12:42:37Z","author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"last_name":"Liske","full_name":"Liske, Gennadij","first_name":"Gennadij"}],"oa":"1","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:51Z","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2013/646"}],"title":"Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles","type":"preprint","status":"public","file":[{"date_updated":"2018-03-15T10:35:04Z","date_created":"2018-03-15T10:35:04Z","creator":"florida","file_size":389797,"access_level":"closed","file_name":"538-AB-KEM_01.pdf","file_id":"1292","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"lang":"eng","text":"We present a new technique to realize attribute-based encryption (ABE) schemes secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our approach is to extend certain concrete chosen-plaintext secure (CPA-secure) ABE schemes to achieve more efficient constructions than the known generic constructions of CCA-secure ABE schemes. We restrict ourselves to the construction of attribute-based key encapsulation mechanisms (KEMs) and present two concrete CCA-secure schemes: a key-policy attribute-based KEM that is based on Goyal's key-policy ABE and a ciphertext-policy attribute-based KEM that is based on Waters' ciphertext-policy ABE. To achieve our goals, we use an appropriate hash function and need to extend the public parameters and the ciphertexts of the underlying CPA-secure encryption schemes only by a single group element. Moreover, we use the same hardness assumptions as the underlying CPA-secure encryption schemes."}],"department":[{"_id":"64"}],"user_id":"25078","_id":"538","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"Securing the Financial Cloud","_id":"43"}],"file_date_updated":"2018-03-15T10:35:04Z","ddc":["040"]},{"abstract":[{"text":"We consider the problem of managing a dynamic heterogeneous storagesystem in a distributed way so that the amount of data assigned to a hostin that system is related to its capacity. Two central problems have to be solvedfor this: (1) organizing the hosts in an overlay network with low degree and diameterso that one can efficiently check the correct distribution of the data androute between any two hosts, and (2) distributing the data among the hosts so thatthe distribution respects the capacities of the hosts and can easily be adapted asthe set of hosts or their capacities change. We present distributed protocols forthese problems that are self-stabilizing and that do not need any global knowledgeabout the system such as the number of nodes or the overall capacity of thesystem. Prior to this work no solution was known satisfying these properties.","lang":"eng"}],"status":"public","file":[{"file_size":262302,"file_name":"542-CONE-DHT_A_distributed_self-stabilizing_algorithm_for_a_heterogeneous_storage_system.pdf","access_level":"closed","file_id":"1289","date_updated":"2018-03-15T10:32:48Z","date_created":"2018-03-15T10:32:48Z","creator":"florida","success":1,"relation":"main_file","content_type":"application/pdf"}],"publication":"Proceedings of the 27th International Symposium on Distributed Computing (DISC)","type":"conference","ddc":["040"],"file_date_updated":"2018-03-15T10:32:48Z","_id":"542","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"department":[{"_id":"79"}],"user_id":"15504","series_title":"LNCS","year":"2013","page":"537-549","citation":{"ama":"Kniesburges S, Koutsopoulos A, Scheideler C. CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system. In: <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>. LNCS. ; 2013:537-549. doi:<a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">10.1007/978-3-642-41527-2_37</a>","ieee":"S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system,” in <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>, 2013, pp. 537–549.","chicago":"Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage System.” In <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>, 537–49. LNCS, 2013. <a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">https://doi.org/10.1007/978-3-642-41527-2_37</a>.","short":"S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of the 27th International Symposium on Distributed Computing (DISC), 2013, pp. 537–549.","mla":"Kniesburges, Sebastian, et al. “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage System.” <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>, 2013, pp. 537–49, doi:<a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">10.1007/978-3-642-41527-2_37</a>.","bibtex":"@inproceedings{Kniesburges_Koutsopoulos_Scheideler_2013, series={LNCS}, title={CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">10.1007/978-3-642-41527-2_37</a>}, booktitle={Proceedings of the 27th International Symposium on Distributed Computing (DISC)}, author={Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler, Christian}, year={2013}, pages={537–549}, collection={LNCS} }","apa":"Kniesburges, S., Koutsopoulos, A., &#38; Scheideler, C. (2013). CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system. In <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i> (pp. 537–549). <a href=\"https://doi.org/10.1007/978-3-642-41527-2_37\">https://doi.org/10.1007/978-3-642-41527-2_37</a>"},"has_accepted_license":"1","title":"CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system","doi":"10.1007/978-3-642-41527-2_37","date_updated":"2022-01-06T07:01:53Z","date_created":"2017-10-17T12:42:38Z","author":[{"last_name":"Kniesburges","full_name":"Kniesburges, Sebastian","first_name":"Sebastian"},{"first_name":"Andreas","full_name":"Koutsopoulos, Andreas","last_name":"Koutsopoulos"},{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"}]},{"type":"conference","publication":"Proceedings of the Conference on Networked Systems (NetSys)","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-15T10:30:42Z","creator":"florida","date_created":"2018-03-15T10:30:42Z","file_size":244841,"file_id":"1286","file_name":"546-Kalman.Graffi_CaReChord.A.Churn.Resistant.Selfstabilizing.Chord.Overlay.Network_02.pdf","access_level":"closed"}],"status":"public","abstract":[{"text":"Self-stabilization is the property of a system to transfer itself regardless of the initial state into a legitimate state. Chord as a simple, decentralized and scalable distributed hash table is an ideal showcase to introduce self-stabilization for p2p overlays. In this paper, we present Re-Chord, a self-stabilizing version of Chord. We show, that the stabilization process is functional, but prone to strong churn. For that, we present Ca-Re-Chord, a churn resistant version of Re-Chord, that allows the creation of a useful DHT in any kind of graph regardless of the initial state. Simulation results attest the churn resistance and good performance of Ca-Re-Chord.","lang":"eng"}],"user_id":"15504","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"name":"SFB 901 - Subproject C1","_id":"13"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"546","file_date_updated":"2018-03-15T10:30:42Z","ddc":["040"],"has_accepted_license":"1","citation":{"short":"K. Graffi, M. Benter, M. Divband, S. Kniesburges, A. Koutsopoulos, in: Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 27–34.","mla":"Graffi, Kalman, et al. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord Overlay Network.” <i>Proceedings of the Conference on Networked Systems (NetSys)</i>, 2013, pp. 27–34, doi:<a href=\"https://doi.org/10.1109/NetSys.2013.11\">10.1109/NetSys.2013.11</a>.","bibtex":"@inproceedings{Graffi_Benter_Divband_Kniesburges_Koutsopoulos_2013, title={Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network}, DOI={<a href=\"https://doi.org/10.1109/NetSys.2013.11\">10.1109/NetSys.2013.11</a>}, booktitle={Proceedings of the Conference on Networked Systems (NetSys)}, author={Graffi, Kalman and Benter, Markus and Divband, Mohammad and Kniesburges, Sebastian and Koutsopoulos, Andreas}, year={2013}, pages={27–34} }","apa":"Graffi, K., Benter, M., Divband, M., Kniesburges, S., &#38; Koutsopoulos, A. (2013). Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network. In <i>Proceedings of the Conference on Networked Systems (NetSys)</i> (pp. 27–34). <a href=\"https://doi.org/10.1109/NetSys.2013.11\">https://doi.org/10.1109/NetSys.2013.11</a>","ama":"Graffi K, Benter M, Divband M, Kniesburges S, Koutsopoulos A. Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network. In: <i>Proceedings of the Conference on Networked Systems (NetSys)</i>. ; 2013:27-34. doi:<a href=\"https://doi.org/10.1109/NetSys.2013.11\">10.1109/NetSys.2013.11</a>","chicago":"Graffi, Kalman, Markus Benter, Mohammad Divband, Sebastian Kniesburges, and Andreas Koutsopoulos. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord Overlay Network.” In <i>Proceedings of the Conference on Networked Systems (NetSys)</i>, 27–34, 2013. <a href=\"https://doi.org/10.1109/NetSys.2013.11\">https://doi.org/10.1109/NetSys.2013.11</a>.","ieee":"K. Graffi, M. Benter, M. Divband, S. Kniesburges, and A. Koutsopoulos, “Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network,” in <i>Proceedings of the Conference on Networked Systems (NetSys)</i>, 2013, pp. 27–34."},"page":"27-34","year":"2013","date_created":"2017-10-17T12:42:38Z","author":[{"first_name":"Kalman","last_name":"Graffi","full_name":"Graffi, Kalman"},{"first_name":"Markus","last_name":"Benter","full_name":"Benter, Markus"},{"full_name":"Divband, Mohammad","last_name":"Divband","first_name":"Mohammad"},{"first_name":"Sebastian","last_name":"Kniesburges","full_name":"Kniesburges, Sebastian"},{"full_name":"Koutsopoulos, Andreas","last_name":"Koutsopoulos","first_name":"Andreas"}],"date_updated":"2022-01-06T07:01:55Z","doi":"10.1109/NetSys.2013.11","title":"Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network"},{"type":"bachelorsthesis","status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"43","name":"Securing the Financial Cloud"}],"_id":"553","user_id":"477","department":[{"_id":"64"}],"language":[{"iso":"ger"}],"year":"2013","citation":{"apa":"Kohn, K. (2013). <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn.","short":"K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.","mla":"Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.","bibtex":"@book{Kohn_2013, title={Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise}, publisher={Universität Paderborn}, author={Kohn, Kathlén}, year={2013} }","ieee":"K. Kohn, <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.","chicago":"Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.","ama":"Kohn K. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn; 2013."},"date_updated":"2022-01-06T07:01:57Z","publisher":"Universität Paderborn","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2017-10-17T12:42:40Z","author":[{"last_name":"Kohn","full_name":"Kohn, Kathlén","first_name":"Kathlén"}],"title":"Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise"},{"doi":"10.1504/IJGUC.2013.057120","main_file_link":[{"url":"http://www.inderscience.com/offer.php?id=57120"}],"title":"A privacy-friendly Architecture for future Cloud Computing","author":[{"last_name":"Petrlic","full_name":"Petrlic, Ronald","first_name":"Ronald"},{"first_name":"Stephan","full_name":"Sekula, Stephan","last_name":"Sekula"},{"full_name":"Sorge, Christoph","last_name":"Sorge","first_name":"Christoph"}],"date_created":"2017-10-17T12:42:41Z","date_updated":"2022-01-06T07:02:07Z","publisher":"InderScience","page":"265-277","citation":{"apa":"Petrlic, R., Sekula, S., &#38; Sorge, C. (2013). A privacy-friendly Architecture for future Cloud Computing. <i>International Journal of Grid and Utility Computing</i>, (4), 265–277. <a href=\"https://doi.org/10.1504/IJGUC.2013.057120\">https://doi.org/10.1504/IJGUC.2013.057120</a>","bibtex":"@article{Petrlic_Sekula_Sorge_2013, title={A privacy-friendly Architecture for future Cloud Computing}, DOI={<a href=\"https://doi.org/10.1504/IJGUC.2013.057120\">10.1504/IJGUC.2013.057120</a>}, number={4}, journal={International Journal of Grid and Utility Computing}, publisher={InderScience}, author={Petrlic, Ronald and Sekula, Stephan and Sorge, Christoph}, year={2013}, pages={265–277} }","mla":"Petrlic, Ronald, et al. “A Privacy-Friendly Architecture for Future Cloud Computing.” <i>International Journal of Grid and Utility Computing</i>, no. 4, InderScience, 2013, pp. 265–77, doi:<a href=\"https://doi.org/10.1504/IJGUC.2013.057120\">10.1504/IJGUC.2013.057120</a>.","short":"R. Petrlic, S. Sekula, C. Sorge, International Journal of Grid and Utility Computing (2013) 265–277.","ama":"Petrlic R, Sekula S, Sorge C. A privacy-friendly Architecture for future Cloud Computing. <i>International Journal of Grid and Utility Computing</i>. 2013;(4):265-277. doi:<a href=\"https://doi.org/10.1504/IJGUC.2013.057120\">10.1504/IJGUC.2013.057120</a>","chicago":"Petrlic, Ronald, Stephan Sekula, and Christoph Sorge. “A Privacy-Friendly Architecture for Future Cloud Computing.” <i>International Journal of Grid and Utility Computing</i>, no. 4 (2013): 265–77. <a href=\"https://doi.org/10.1504/IJGUC.2013.057120\">https://doi.org/10.1504/IJGUC.2013.057120</a>.","ieee":"R. Petrlic, S. Sekula, and C. Sorge, “A privacy-friendly Architecture for future Cloud Computing,” <i>International Journal of Grid and Utility Computing</i>, no. 4, pp. 265–277, 2013."},"year":"2013","issue":"4","has_accepted_license":"1","file_date_updated":"2018-03-15T10:26:14Z","ddc":["040"],"user_id":"477","_id":"561","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"status":"public","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":1036554,"file_id":"1280","access_level":"closed","file_name":"561-authorFinalVersion.pdf","date_updated":"2018-03-15T10:26:14Z","creator":"florida","date_created":"2018-03-15T10:26:14Z"}],"abstract":[{"lang":"eng","text":"We present a privacy-friendly architecture for a future cloud computing scenario where software licensing and software payment plays a major role. We show how digital rights management as a technical solution for software licensing can be achieved in a privacy-friendly manner. In our scenario, users who buy software from software providers and execute it at computing centres stay anonymous. At the same time, our approach guarantees that software licenses are bound to users and that their validity is checked before execution. Thus, DRM constitutes an incentive for software providers to take part in such a future cloud computing scenario. We employ a software re-encryption scheme so that computing centres are not able to build profiles of their users – not even under a pseudonym. We make sure that malicious users are unable to relay software to others. "}],"publication":"International Journal of Grid and Utility Computing","type":"journal_article"},{"type":"conference","publication":"Proceedings of the International Conference on Field-Programmable Technology (FPT)","abstract":[{"text":"Cold-boot attacks exploit the fact that DRAM contents are not immediately lost when a PC is powered off. Instead the contents decay rather slowly, in particular if the DRAM chips are cooled to low temperatures. This effect opens an attack vector on cryptographic applications that keep decrypted keys in DRAM. An attacker with access to the target computer can reboot it or remove the RAM modules and quickly copy the RAM contents to non-volatile memory. By exploiting the known cryptographic structure of the cipher and layout of the key data in memory, in our application an AES key schedule with redundancy, the resulting memory image can be searched for sections that could correspond to decayed cryptographic keys; then, the attacker can attempt to reconstruct the original key. However, the runtime of these algorithms grows rapidly with increasing memory image size, error rate and complexity of the bit error model, which limits the practicability of the approach.In this work, we study how the algorithm for key search can be accelerated with custom computing machines. We present an FPGA-based architecture on a Maxeler dataflow computing system that outperforms a software implementation up to 205x, which significantly improves the practicability of cold-attacks against AES.","lang":"eng"}],"file":[{"access_level":"closed","file_id":"1294","file_name":"528-plessl13_fpt.pdf","file_size":822680,"creator":"florida","date_created":"2018-03-15T10:36:08Z","date_updated":"2018-03-15T10:36:08Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","project":[{"_id":"1","name":"SFB 901","grant_number":"160364472"},{"grant_number":"160364472","name":"SFB 901 - Subprojekt C2","_id":"14"},{"name":"SFB 901 - Subproject C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"34","name":"Self-Adaptive Virtualisation-Aware High-Performance/Low-Energy Heterogeneous System Architectures","grant_number":"610996"}],"_id":"528","user_id":"15278","department":[{"_id":"27"},{"_id":"518"},{"_id":"78"}],"ddc":["040"],"keyword":["coldboot"],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-15T10:36:08Z","has_accepted_license":"1","quality_controlled":"1","year":"2013","citation":{"apa":"Riebler, H., Kenter, T., Sorge, C., &#38; Plessl, C. (2013). FPGA-accelerated Key Search for Cold-Boot Attacks against AES. <i>Proceedings of the International Conference on Field-Programmable Technology (FPT)</i>, 386–389. <a href=\"https://doi.org/10.1109/FPT.2013.6718394\">https://doi.org/10.1109/FPT.2013.6718394</a>","short":"H. Riebler, T. Kenter, C. Sorge, C. Plessl, in: Proceedings of the International Conference on Field-Programmable Technology (FPT), IEEE, 2013, pp. 386–389.","mla":"Riebler, Heinrich, et al. “FPGA-Accelerated Key Search for Cold-Boot Attacks against AES.” <i>Proceedings of the International Conference on Field-Programmable Technology (FPT)</i>, IEEE, 2013, pp. 386–89, doi:<a href=\"https://doi.org/10.1109/FPT.2013.6718394\">10.1109/FPT.2013.6718394</a>.","bibtex":"@inproceedings{Riebler_Kenter_Sorge_Plessl_2013, title={FPGA-accelerated Key Search for Cold-Boot Attacks against AES}, DOI={<a href=\"https://doi.org/10.1109/FPT.2013.6718394\">10.1109/FPT.2013.6718394</a>}, booktitle={Proceedings of the International Conference on Field-Programmable Technology (FPT)}, publisher={IEEE}, author={Riebler, Heinrich and Kenter, Tobias and Sorge, Christoph and Plessl, Christian}, year={2013}, pages={386–389} }","ama":"Riebler H, Kenter T, Sorge C, Plessl C. FPGA-accelerated Key Search for Cold-Boot Attacks against AES. In: <i>Proceedings of the International Conference on Field-Programmable Technology (FPT)</i>. IEEE; 2013:386-389. doi:<a href=\"https://doi.org/10.1109/FPT.2013.6718394\">10.1109/FPT.2013.6718394</a>","chicago":"Riebler, Heinrich, Tobias Kenter, Christoph Sorge, and Christian Plessl. “FPGA-Accelerated Key Search for Cold-Boot Attacks against AES.” In <i>Proceedings of the International Conference on Field-Programmable Technology (FPT)</i>, 386–89. IEEE, 2013. <a href=\"https://doi.org/10.1109/FPT.2013.6718394\">https://doi.org/10.1109/FPT.2013.6718394</a>.","ieee":"H. Riebler, T. Kenter, C. Sorge, and C. Plessl, “FPGA-accelerated Key Search for Cold-Boot Attacks against AES,” in <i>Proceedings of the International Conference on Field-Programmable Technology (FPT)</i>, 2013, pp. 386–389, doi: <a href=\"https://doi.org/10.1109/FPT.2013.6718394\">10.1109/FPT.2013.6718394</a>."},"page":"386-389","date_updated":"2023-09-26T13:37:35Z","publisher":"IEEE","date_created":"2017-10-17T12:42:35Z","author":[{"first_name":"Heinrich","last_name":"Riebler","id":"8961","full_name":"Riebler, Heinrich"},{"id":"3145","full_name":"Kenter, Tobias","last_name":"Kenter","first_name":"Tobias"},{"last_name":"Sorge","full_name":"Sorge, Christoph","first_name":"Christoph"},{"first_name":"Christian","last_name":"Plessl","orcid":"0000-0001-5728-9982","full_name":"Plessl, Christian","id":"16153"}],"title":"FPGA-accelerated Key Search for Cold-Boot Attacks against AES","doi":"10.1109/FPT.2013.6718394"},{"type":"conference_editor","abstract":[{"text":"SSS is an international forum for researchers and practitioners in the design and development of distributed systems with self-properties: (classical) self-stabilizing, self-configuring, self-organizing, self-managing, self-repairing, self-healing, self-optimizing, self-adaptive, and self-protecting. Research in distributed systems is now at a crucialpoint in its evolution, marked by the importance of dynamic systems such as peer-to-peer networks, large-scale wireless sensor networks, mobile ad hoc networks, cloud computing, robotic networks, etc. Moreover, new applications such as grid and web services, banking and e-commerce, e-health and robotics, aerospace and avionics, automotive, industrial process control, etc. have joined the traditional applications of distributed systems. The theory of self-stabilization has been enriched in the last 30 years by high quality research contributions in the areas of algorithmic techniques, formal methodologies, model theoretic issues, and composition techniques. All these areas are essential to the understanding and maintenance of self-properties in fault-tolerant distributed systems.","lang":"eng"}],"editor":[{"full_name":"Richa, Andrea W.","last_name":"Richa","first_name":"Andrea W."},{"first_name":"Christian","last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792"}],"file":[{"file_size":169564,"file_id":"1569","file_name":"577-SSS2012Richa-Scheideler.pdf","access_level":"closed","date_updated":"2018-03-21T13:09:19Z","creator":"florida","date_created":"2018-03-21T13:09:19Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"577","user_id":"15504","department":[{"_id":"79"}],"ddc":["040"],"file_date_updated":"2018-03-21T13:09:19Z","has_accepted_license":"1","year":"2012","citation":{"bibtex":"@book{Richa_Scheideler_2012, title={Stabilization, Safety, and Security of Distributed Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-33536-5\">10.1007/978-3-642-33536-5</a>}, year={2012} }","mla":"Richa, Andrea W., and Christian Scheideler, editors. <i>Stabilization, Safety, and Security of Distributed Systems</i>. 2012, doi:<a href=\"https://doi.org/10.1007/978-3-642-33536-5\">10.1007/978-3-642-33536-5</a>.","short":"A.W. Richa, C. Scheideler, eds., Stabilization, Safety, and Security of Distributed Systems, 2012.","apa":"Richa, A. W., &#38; Scheideler, C. (Eds.). (2012). <i>Stabilization, Safety, and Security of Distributed Systems</i>. Presented at the Stabilization, Safety, and Security of Distributed Systems (SSS), Paderborn, Germany. <a href=\"https://doi.org/10.1007/978-3-642-33536-5\">https://doi.org/10.1007/978-3-642-33536-5</a>","chicago":"Richa, Andrea W., and Christian Scheideler, eds. <i>Stabilization, Safety, and Security of Distributed Systems</i>, 2012. <a href=\"https://doi.org/10.1007/978-3-642-33536-5\">https://doi.org/10.1007/978-3-642-33536-5</a>.","ieee":"A. W. Richa and C. Scheideler, Eds., <i>Stabilization, Safety, and Security of Distributed Systems</i>. 2012.","ama":"Richa AW, Scheideler C, eds. <i>Stabilization, Safety, and Security of Distributed Systems</i>.; 2012. doi:<a href=\"https://doi.org/10.1007/978-3-642-33536-5\">10.1007/978-3-642-33536-5</a>"},"date_updated":"2022-01-06T07:02:39Z","date_created":"2017-10-17T12:42:44Z","title":"Stabilization, Safety, and Security of Distributed Systems","conference":{"end_date":"2012-10-04","location":"Paderborn, Germany","name":"Stabilization, Safety, and Security of Distributed Systems (SSS)","start_date":"2012-10-01"},"doi":"10.1007/978-3-642-33536-5"},{"has_accepted_license":"1","year":"2012","page":"1272-1283","citation":{"ama":"Drees M, Hüllmann (married name: Eikel) M, Koutsopoulos A, Scheideler C. Self-Organizing Particle Systems. In: <i>Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS)</i>. ; 2012:1272-1283. doi:<a href=\"https://doi.org/10.1109/IPDPS.2012.116\">10.1109/IPDPS.2012.116</a>","chicago":"Drees, Maximilian, Martina Hüllmann (married name: Eikel), Andreas Koutsopoulos, and Christian Scheideler. “Self-Organizing Particle Systems.” In <i>Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS)</i>, 1272–83, 2012. <a href=\"https://doi.org/10.1109/IPDPS.2012.116\">https://doi.org/10.1109/IPDPS.2012.116</a>.","ieee":"M. Drees, M. Hüllmann (married name: Eikel), A. Koutsopoulos, and C. Scheideler, “Self-Organizing Particle Systems,” in <i>Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS)</i>, 2012, pp. 1272–1283.","apa":"Drees, M., Hüllmann (married name: Eikel), M., Koutsopoulos, A., &#38; Scheideler, C. (2012). Self-Organizing Particle Systems. In <i>Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS)</i> (pp. 1272–1283). <a href=\"https://doi.org/10.1109/IPDPS.2012.116\">https://doi.org/10.1109/IPDPS.2012.116</a>","short":"M. Drees, M. Hüllmann (married name: Eikel), A. Koutsopoulos, C. Scheideler, in: Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2012, pp. 1272–1283.","bibtex":"@inproceedings{Drees_Hüllmann (married name: Eikel)_Koutsopoulos_Scheideler_2012, title={Self-Organizing Particle Systems}, DOI={<a href=\"https://doi.org/10.1109/IPDPS.2012.116\">10.1109/IPDPS.2012.116</a>}, booktitle={Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS)}, author={Drees, Maximilian and Hüllmann (married name: Eikel), Martina and Koutsopoulos, Andreas and Scheideler, Christian}, year={2012}, pages={1272–1283} }","mla":"Drees, Maximilian, et al. “Self-Organizing Particle Systems.” <i>Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS)</i>, 2012, pp. 1272–83, doi:<a href=\"https://doi.org/10.1109/IPDPS.2012.116\">10.1109/IPDPS.2012.116</a>."},"date_updated":"2022-01-06T07:02:42Z","date_created":"2017-10-17T12:42:45Z","author":[{"full_name":"Drees, Maximilian","last_name":"Drees","first_name":"Maximilian"},{"first_name":"Martina","full_name":"Hüllmann (married name: Eikel), Martina","last_name":"Hüllmann (married name: Eikel)"},{"first_name":"Andreas","full_name":"Koutsopoulos, Andreas","last_name":"Koutsopoulos"},{"last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792","first_name":"Christian"}],"title":"Self-Organizing Particle Systems","doi":"10.1109/IPDPS.2012.116","publication":"Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS)","type":"conference","abstract":[{"lang":"eng","text":"Nanoparticles are getting more and more in the focus of the scientic community since the potential for the development of very small particles interacting with each other and completing medical and other tasks is getting bigger year by year. In this work we introduce a distributed local algorithm for arranging a set of nanoparticles on the discrete plane into specic geometric shapes, for instance a rectangle. The concept of a particle we use can be seen as a simple mobile robot with the following restrictions: it can only view the state of robots it is physically connected to, is anonymous, has only a constant size memory, can only move by using other particles as an anchor point on which it pulls itself alongside, and it operates in Look-Compute-Move cycles. The main result of this work is the presentation of a random distributed local algorithm which transforms any given connected set of particles into a particular geometric shape. As an example we provide a version of this algorithm for forming a rectangle with an arbitrary predened aspect ratio. To the best of our knowledge this is the rst work that considers arrangement problems for these types of robots."}],"status":"public","file":[{"creator":"florida","date_created":"2018-03-15T08:39:33Z","date_updated":"2018-03-15T08:39:33Z","file_name":"581-IPDPS2012-Scheideler_Huellmann.pdf","access_level":"closed","file_id":"1263","file_size":373131,"content_type":"application/pdf","relation":"main_file","success":1}],"_id":"581","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"department":[{"_id":"79"},{"_id":"63"}],"user_id":"14955","ddc":["040"],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-15T08:39:33Z"},{"citation":{"apa":"Petrlic, R. (2012). Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme. In <i>Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS)</i> (pp. 194–211). <a href=\"https://doi.org/10.1007/978-3-642-35362-8_16\">https://doi.org/10.1007/978-3-642-35362-8_16</a>","bibtex":"@inproceedings{Petrlic_2012, series={LNCS}, title={Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-35362-8_16\">10.1007/978-3-642-35362-8_16</a>}, booktitle={Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS)}, author={Petrlic, Ronald}, year={2012}, pages={194–211}, collection={LNCS} }","mla":"Petrlic, Ronald. “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.” <i>Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS)</i>, 2012, pp. 194–211, doi:<a href=\"https://doi.org/10.1007/978-3-642-35362-8_16\">10.1007/978-3-642-35362-8_16</a>.","short":"R. Petrlic, in: Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS), 2012, pp. 194–211.","ama":"Petrlic R. Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme. In: <i>Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS)</i>. LNCS. ; 2012:194-211. doi:<a href=\"https://doi.org/10.1007/978-3-642-35362-8_16\">10.1007/978-3-642-35362-8_16</a>","chicago":"Petrlic, Ronald. “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.” In <i>Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS)</i>, 194–211. LNCS, 2012. <a href=\"https://doi.org/10.1007/978-3-642-35362-8_16\">https://doi.org/10.1007/978-3-642-35362-8_16</a>.","ieee":"R. Petrlic, “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme,” in <i>Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS)</i>, 2012, pp. 194–211."},"page":"194-211","year":"2012","has_accepted_license":"1","doi":"10.1007/978-3-642-35362-8_16","title":"Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme","author":[{"first_name":"Ronald","last_name":"Petrlic","full_name":"Petrlic, Ronald"}],"date_created":"2017-10-17T12:42:46Z","date_updated":"2022-01-06T07:02:43Z","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-15T08:38:58Z","date_created":"2018-03-15T08:38:58Z","creator":"florida","file_size":582557,"file_id":"1262","access_level":"closed","file_name":"585-privacy-drm-cloud-1-css-camera-ready.pdf"}],"status":"public","abstract":[{"lang":"eng","text":"In a cloud-computing scenario where users buy software from software providers and execute it at computing centers, a digital rights management (DRM) system has to be in place to check the software licenses during each software execution. However, the exposure of users to privacy invasion in the presence of DRM systems is problematic.We come up with a concept that unites software providers' and users' demands for a secure and privacy-preserving DRM system for cloud computing. The employment of proxy re-encryption allows for a prevention of profile building (under pseudonym) of users by any party."}],"type":"conference","publication":"Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS)","file_date_updated":"2018-03-15T08:38:58Z","ddc":["040"],"series_title":"LNCS","user_id":"15504","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"585"},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"588","user_id":"15504","ddc":["040"],"file_date_updated":"2018-03-15T08:36:16Z","type":"conference","publication":"Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA)","abstract":[{"lang":"eng","text":"We come up with a digital rights management (DRM) concept for cloud computing and show how license management for software within the cloud can be achieved in a privacy-friendly manner. In our scenario, users who buy software from software providers stay anonymous. At the same time, our approach guarantees that software licenses are bound to users and their validity is checked before execution. We employ a software re-encryption scheme so that computing centers which execute users’ software are not able to build user profiles—not even under pseudonym—of their users. We combine secret sharing and homomorphic encryption. We make sure that malicious users are unable to relay software to others. DRM constitutes an incentive for software providers to take part in a future cloud computing scenario.We make this scenario more attractive for users by preserving their privacy."}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-15T08:36:16Z","date_created":"2018-03-15T08:36:16Z","creator":"florida","file_size":194323,"access_level":"closed","file_name":"588-drm0-published_01.pdf","file_id":"1259"}],"status":"public","date_updated":"2022-01-06T07:02:45Z","author":[{"full_name":"Petrlic, Ronald","last_name":"Petrlic","first_name":"Ronald"},{"last_name":"Sorge","full_name":"Sorge, Christoph","first_name":"Christoph"}],"date_created":"2017-10-17T12:42:46Z","title":"Privacy-Preserving DRM for Cloud Computing","doi":"10.1109/WAINA.2012.92","has_accepted_license":"1","year":"2012","citation":{"apa":"Petrlic, R., &#38; Sorge, C. (2012). Privacy-Preserving DRM for Cloud Computing. In <i>Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA)</i> (pp. 1286–1291). <a href=\"https://doi.org/10.1109/WAINA.2012.92\">https://doi.org/10.1109/WAINA.2012.92</a>","mla":"Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving DRM for Cloud Computing.” <i>Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA)</i>, 2012, pp. 1286–91, doi:<a href=\"https://doi.org/10.1109/WAINA.2012.92\">10.1109/WAINA.2012.92</a>.","bibtex":"@inproceedings{Petrlic_Sorge_2012, title={Privacy-Preserving DRM for Cloud Computing}, DOI={<a href=\"https://doi.org/10.1109/WAINA.2012.92\">10.1109/WAINA.2012.92</a>}, booktitle={Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA)}, author={Petrlic, Ronald and Sorge, Christoph}, year={2012}, pages={1286–1291} }","short":"R. Petrlic, C. Sorge, in: Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012, pp. 1286–1291.","ieee":"R. Petrlic and C. Sorge, “Privacy-Preserving DRM for Cloud Computing,” in <i>Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA)</i>, 2012, pp. 1286–1291.","chicago":"Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving DRM for Cloud Computing.” In <i>Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA)</i>, 1286–91, 2012. <a href=\"https://doi.org/10.1109/WAINA.2012.92\">https://doi.org/10.1109/WAINA.2012.92</a>.","ama":"Petrlic R, Sorge C. Privacy-Preserving DRM for Cloud Computing. In: <i>Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA)</i>. ; 2012:1286-1291. doi:<a href=\"https://doi.org/10.1109/WAINA.2012.92\">10.1109/WAINA.2012.92</a>"},"page":"1286-1291"}]
