---
_id: '471'
author:
- first_name: Alina
  full_name: Tezer, Alina
  last_name: Tezer
citation:
  ama: Tezer A. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in
    identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn; 2013.
  apa: Tezer, A. (2013). <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern
    in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn.
  bibtex: '@book{Tezer_2013, title={Verteilte Erstellung und Aktualisierung von Schlüsselservern
    in identitätsbasierten Verschlüsselungssystemen}, publisher={Universität Paderborn},
    author={Tezer, Alina}, year={2013} }'
  chicago: Tezer, Alina. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern
    in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.
  ieee: A. Tezer, <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern
    in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.
  mla: Tezer, Alina. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern
    in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.
  short: A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in
    identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:23Z
date_updated: 2022-01-06T07:01:19Z
department:
- _id: '64'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten
  Verschlüsselungssystemen
type: bachelorsthesis
user_id: '477'
year: '2013'
...
---
_id: '473'
abstract:
- lang: eng
  text: We present a solution to the problem of privacy invasion in a multiparty digital
    rights management scheme. (Roaming) users buy content licenses from a content
    provider and execute it at any nearby content distributor. Our approach, which
    does not need any trusted third party - in contrast to most related work on privacy-preserving
    DRM - is based on a re-encryption scheme that runs on any mobile Android device.
    Only a minor security-critical part needs to be performed on the device's smartcard
    which could, for instance, be a SIM card.
author:
- first_name: Ronald
  full_name: Petrlic, Ronald
  last_name: Petrlic
- first_name: Stephan
  full_name: Sekula, Stephan
  last_name: Sekula
citation:
  ama: 'Petrlic R, Sekula S. Unlinkable content playbacks in a multiparty DRM system.
    In: Wang L, Shafiq B, eds. <i>Data and Applications Security and Privacy XXVII</i>.
    Lecture Notes in Computer Science. ; 2013:289-296. doi:<a href="https://doi.org/10.1007/978-3-642-39256-6_21">10.1007/978-3-642-39256-6_21</a>'
  apa: Petrlic, R., &#38; Sekula, S. (2013). Unlinkable content playbacks in a multiparty
    DRM system. In L. Wang &#38; B. Shafiq (Eds.), <i>Data and Applications Security
    and Privacy XXVII</i> (pp. 289–296). <a href="https://doi.org/10.1007/978-3-642-39256-6_21">https://doi.org/10.1007/978-3-642-39256-6_21</a>
  bibtex: '@inproceedings{Petrlic_Sekula_2013, series={Lecture Notes in Computer Science},
    title={Unlinkable content playbacks in a multiparty DRM system}, DOI={<a href="https://doi.org/10.1007/978-3-642-39256-6_21">10.1007/978-3-642-39256-6_21</a>},
    booktitle={Data and Applications Security and Privacy XXVII}, author={Petrlic,
    Ronald and Sekula, Stephan}, editor={Wang, Lingyu and Shafiq, BasitEditors}, year={2013},
    pages={289–296}, collection={Lecture Notes in Computer Science} }'
  chicago: Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a
    Multiparty DRM System.” In <i>Data and Applications Security and Privacy XXVII</i>,
    edited by Lingyu Wang and Basit Shafiq, 289–96. Lecture Notes in Computer Science,
    2013. <a href="https://doi.org/10.1007/978-3-642-39256-6_21">https://doi.org/10.1007/978-3-642-39256-6_21</a>.
  ieee: R. Petrlic and S. Sekula, “Unlinkable content playbacks in a multiparty DRM
    system,” in <i>Data and Applications Security and Privacy XXVII</i>, 2013, pp.
    289–296.
  mla: Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty
    DRM System.” <i>Data and Applications Security and Privacy XXVII</i>, edited by
    Lingyu Wang and Basit Shafiq, 2013, pp. 289–96, doi:<a href="https://doi.org/10.1007/978-3-642-39256-6_21">10.1007/978-3-642-39256-6_21</a>.
  short: 'R. Petrlic, S. Sekula, in: L. Wang, B. Shafiq (Eds.), Data and Applications
    Security and Privacy XXVII, 2013, pp. 289–296.'
date_created: 2017-10-17T12:42:24Z
date_updated: 2022-01-06T07:01:19Z
ddc:
- '040'
doi: 10.1007/978-3-642-39256-6_21
editor:
- first_name: Lingyu
  full_name: Wang, Lingyu
  last_name: Wang
- first_name: Basit
  full_name: Shafiq, Basit
  last_name: Shafiq
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-16T11:17:30Z
  date_updated: 2018-03-16T11:17:30Z
  file_id: '1330'
  file_name: 473-drm-general-1-camera-ready.pdf
  file_size: 286049
  relation: main_file
  success: 1
file_date_updated: 2018-03-16T11:17:30Z
has_accepted_license: '1'
page: 289-296
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Data and Applications Security and Privacy XXVII
series_title: Lecture Notes in Computer Science
status: public
title: Unlinkable content playbacks in a multiparty DRM system
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '475'
abstract:
- lang: eng
  text: We propose a privacy-preserving digital rights management scheme for (future)
    cloud computing. Users buy software from software providers and execute it at
    computing centers. Our solution allows software providers to provide different
    license models, like execute at most n-times models. Users’ anonymity and unlinkability
    of actions are preserved and thus, profile building is not even possible under
    (a) pseudonym. Privacy protection in the honest-but-curious model is achieved
    by combining ring signatures with an anonymous recipient scheme.We employ secret
    sharing in a unique manner that allows the software provider to expose the user’s
    identity if the user commits fraud, e.g. by exceeding the execution limit n.
author:
- first_name: Nakul
  full_name: Joshi, Nakul
  last_name: Joshi
- first_name: Ronald
  full_name: Petrlic, Ronald
  last_name: Petrlic
citation:
  ama: 'Joshi N, Petrlic R. Towards practical privacy-preserving Digital Rights Management
    for Cloud Computing. In: <i>Proceedings of the 10th Annual IEEE Consumer Communications
    &#38; Networking Conference (CCNC)</i>. ; 2013:259-264. doi:<a href="https://doi.org/10.1109/CCNC.2013.6488456">10.1109/CCNC.2013.6488456</a>'
  apa: Joshi, N., &#38; Petrlic, R. (2013). Towards practical privacy-preserving Digital
    Rights Management for Cloud Computing. In <i>Proceedings of the 10th Annual IEEE
    Consumer Communications &#38; Networking Conference (CCNC)</i> (pp. 259–264).
    <a href="https://doi.org/10.1109/CCNC.2013.6488456">https://doi.org/10.1109/CCNC.2013.6488456</a>
  bibtex: '@inproceedings{Joshi_Petrlic_2013, title={Towards practical privacy-preserving
    Digital Rights Management for Cloud Computing}, DOI={<a href="https://doi.org/10.1109/CCNC.2013.6488456">10.1109/CCNC.2013.6488456</a>},
    booktitle={Proceedings of the 10th Annual IEEE Consumer Communications &#38; Networking
    Conference (CCNC)}, author={Joshi, Nakul and Petrlic, Ronald}, year={2013}, pages={259–264}
    }'
  chicago: Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving
    Digital Rights Management for Cloud Computing.” In <i>Proceedings of the 10th
    Annual IEEE Consumer Communications &#38; Networking Conference (CCNC)</i>, 259–64,
    2013. <a href="https://doi.org/10.1109/CCNC.2013.6488456">https://doi.org/10.1109/CCNC.2013.6488456</a>.
  ieee: N. Joshi and R. Petrlic, “Towards practical privacy-preserving Digital Rights
    Management for Cloud Computing,” in <i>Proceedings of the 10th Annual IEEE Consumer
    Communications &#38; Networking Conference (CCNC)</i>, 2013, pp. 259–264.
  mla: Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital
    Rights Management for Cloud Computing.” <i>Proceedings of the 10th Annual IEEE
    Consumer Communications &#38; Networking Conference (CCNC)</i>, 2013, pp. 259–64,
    doi:<a href="https://doi.org/10.1109/CCNC.2013.6488456">10.1109/CCNC.2013.6488456</a>.
  short: 'N. Joshi, R. Petrlic, in: Proceedings of the 10th Annual IEEE Consumer Communications
    &#38; Networking Conference (CCNC), 2013, pp. 259–264.'
date_created: 2017-10-17T12:42:24Z
date_updated: 2022-01-06T07:01:21Z
ddc:
- '040'
doi: 10.1109/CCNC.2013.6488456
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-16T11:16:29Z
  date_updated: 2018-03-16T11:16:29Z
  file_id: '1328'
  file_name: 475-privacy-drm-cloud-5.pdf
  file_size: 370473
  relation: main_file
  success: 1
file_date_updated: 2018-03-16T11:16:29Z
has_accepted_license: '1'
page: 259-264
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 10th Annual IEEE Consumer Communications & Networking
  Conference (CCNC)
status: public
title: Towards practical privacy-preserving Digital Rights Management for Cloud Computing
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '486'
author:
- first_name: Oliver
  full_name: Otte, Oliver
  last_name: Otte
citation:
  ama: Otte O. <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität
    Paderborn; 2013.
  apa: Otte, O. (2013). <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>.
    Universität Paderborn.
  bibtex: '@book{Otte_2013, title={Seitenkanalresistenz paarungsbasierter Kryptographie},
    publisher={Universität Paderborn}, author={Otte, Oliver}, year={2013} }'
  chicago: Otte, Oliver. <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>.
    Universität Paderborn, 2013.
  ieee: O. Otte, <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität
    Paderborn, 2013.
  mla: Otte, Oliver. <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>.
    Universität Paderborn, 2013.
  short: O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie, Universität
    Paderborn, 2013.
date_created: 2017-10-17T12:42:27Z
date_updated: 2022-01-06T07:01:27Z
department:
- _id: '64'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Seitenkanalresistenz paarungsbasierter Kryptographie
type: bachelorsthesis
user_id: '477'
year: '2013'
...
---
_id: '487'
author:
- first_name: Jan
  full_name: Bobolz, Jan
  id: '27207'
  last_name: Bobolz
citation:
  ama: Bobolz J. <i>Security Proofs for Pairing-Based Cryptography in the Generic
    Group Model</i>. Universität Paderborn; 2013.
  apa: Bobolz, J. (2013). <i>Security Proofs for Pairing-Based Cryptography in the
    Generic Group Model</i>. Universität Paderborn.
  bibtex: '@book{Bobolz_2013, title={Security Proofs for Pairing-Based Cryptography
    in the Generic Group Model}, publisher={Universität Paderborn}, author={Bobolz,
    Jan}, year={2013} }'
  chicago: Bobolz, Jan. <i>Security Proofs for Pairing-Based Cryptography in the Generic
    Group Model</i>. Universität Paderborn, 2013.
  ieee: J. Bobolz, <i>Security Proofs for Pairing-Based Cryptography in the Generic
    Group Model</i>. Universität Paderborn, 2013.
  mla: Bobolz, Jan. <i>Security Proofs for Pairing-Based Cryptography in the Generic
    Group Model</i>. Universität Paderborn, 2013.
  short: J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic
    Group Model, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:27Z
date_updated: 2022-01-06T07:01:28Z
ddc:
- '000'
department:
- _id: '64'
file:
- access_level: open_access
  content_type: application/pdf
  creator: jbobolz
  date_created: 2018-04-13T11:42:08Z
  date_updated: 2018-06-29T09:56:54Z
  file_id: '2346'
  file_name: thesis_jbobolz_final.pdf
  file_size: 874286
  relation: main_file
file_date_updated: 2018-06-29T09:56:54Z
has_accepted_license: '1'
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '13'
  name: SFB 901 - Subproject C1
publisher: Universität Paderborn
status: public
title: Security Proofs for Pairing-Based Cryptography in the Generic Group Model
type: bachelorsthesis
urn: '4875'
user_id: '27207'
year: '2013'
...
---
_id: '488'
abstract:
- lang: eng
  text: Unattended systems are key ingredients of various critical infrastruc-tures
    like networks of self service terminals or automated teller machines.For cost
    and efficiency reasons they should mostly run autonomously.Unattended systems
    are attractive and lucrative targets for various kindsof attacks, including attacks
    on the integrity of their components and thecommunication between components.
    In this paper, we propose a gen-eral cryptographic framework to protect unattended
    systems. We alsodemonstrate that instantiating the framework with techniques from
    iden-tity based cryptography is particularly well-suited to efficiently secureunattended
    systems.
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
citation:
  ama: 'Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with
    Identity Based Cryptography - A Case Study. In: <i>Proceedings of the 5th International
    Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>.
    ; 2013:98-105.'
  apa: Blömer, J., Günther, P., &#38; Krummel, V. (2013). Securing Critical Unattended
    Systems with Identity Based Cryptography - A Case Study. In <i>Proceedings of
    the 5th International Conference on Mathematical Aspects of Computer and Information
    Sciences (MACIS)</i> (pp. 98–105).
  bibtex: '@inproceedings{Blömer_Günther_Krummel_2013, title={Securing Critical Unattended
    Systems with Identity Based Cryptography - A Case Study}, booktitle={Proceedings
    of the 5th International Conference on Mathematical Aspects of Computer and Information
    Sciences (MACIS)}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker},
    year={2013}, pages={98–105} }'
  chicago: Blömer, Johannes, Peter Günther, and Volker Krummel. “Securing Critical
    Unattended Systems with Identity Based Cryptography - A Case Study.” In <i>Proceedings
    of the 5th International Conference on Mathematical Aspects of Computer and Information
    Sciences (MACIS)</i>, 98–105, 2013.
  ieee: J. Blömer, P. Günther, and V. Krummel, “Securing Critical Unattended Systems
    with Identity Based Cryptography - A Case Study,” in <i>Proceedings of the 5th
    International Conference on Mathematical Aspects of Computer and Information Sciences
    (MACIS)</i>, 2013, pp. 98–105.
  mla: Blömer, Johannes, et al. “Securing Critical Unattended Systems with Identity
    Based Cryptography - A Case Study.” <i>Proceedings of the 5th International Conference
    on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2013,
    pp. 98–105.
  short: 'J. Blömer, P. Günther, V. Krummel, in: Proceedings of the 5th International
    Conference on Mathematical Aspects of Computer and Information Sciences (MACIS),
    2013, pp. 98–105.'
date_created: 2017-10-17T12:42:27Z
date_updated: 2022-01-06T07:01:28Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T13:46:52Z
  date_updated: 2018-03-15T13:46:52Z
  file_id: '1317'
  file_name: 488-MACIS13.pdf
  file_size: 301962
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T13:46:52Z
has_accepted_license: '1'
page: 98-105
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 5th International Conference on Mathematical Aspects
  of Computer and Information Sciences (MACIS)
status: public
title: Securing Critical Unattended Systems with Identity Based Cryptography - A Case
  Study
type: conference
user_id: '477'
year: '2013'
...
---
_id: '519'
abstract:
- lang: eng
  text: In this work we present the first scalable distributed information system,i.e.,
    a system with low storage overhead, that is provably robust againstDenial-of-Service
    (DoS) attacks by a current insider. We allow acurrent insider to have complete
    knowledge about the information systemand to have the power to block any \epsilon-fraction
    of its serversby a DoS-attack, where \epsilon can be chosen up to a constant.
    The taskof the system is to serve any collection of lookup requests with at most
    oneper non-blocked server in an efficient way despite this attack. Previously,scalable
    solutions were only known for DoS-attacks of past insiders, where apast insider
    only has complete knowledge about some past time pointt_0 of the information system.
    Scheideler et al. (DISC 2007, SPAA 2009) showedthat in this case it is possible
    to design an information system so that anyinformation that was inserted or last
    updated after t_0 is safe against a DoS-attack. But their constructions would
    not work at all for a current insider. The key idea behindour IRIS system is to
    make extensive use of coding. More precisely, we presenttwo alternative distributed
    coding strategies with an at most logarithmicstorage overhead that can handle
    up to a constant fraction of blocked servers.
author:
- first_name: Martina
  full_name: Eikel, Martina
  last_name: Eikel
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Eikel M, Scheideler C. IRIS: A Robust Information System Against Insider DoS-Attacks.
    In: <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and
    Architectures (SPAA)</i>. ; 2013:119-129. doi:<a href="https://doi.org/10.1145/2486159.2486186">10.1145/2486159.2486186</a>'
  apa: 'Eikel, M., &#38; Scheideler, C. (2013). IRIS: A Robust Information System
    Against Insider DoS-Attacks. In <i>Proceedings of the 25th ACM Symposium on Parallelism
    in Algorithms and Architectures (SPAA)</i> (pp. 119–129). <a href="https://doi.org/10.1145/2486159.2486186">https://doi.org/10.1145/2486159.2486186</a>'
  bibtex: '@inproceedings{Eikel_Scheideler_2013, title={IRIS: A Robust Information
    System Against Insider DoS-Attacks}, DOI={<a href="https://doi.org/10.1145/2486159.2486186">10.1145/2486159.2486186</a>},
    booktitle={Proceedings of the 25th ACM Symposium on Parallelism in Algorithms
    and Architectures (SPAA)}, author={Eikel, Martina and Scheideler, Christian},
    year={2013}, pages={119–129} }'
  chicago: 'Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information
    System Against Insider DoS-Attacks.” In <i>Proceedings of the 25th ACM Symposium
    on Parallelism in Algorithms and Architectures (SPAA)</i>, 119–29, 2013. <a href="https://doi.org/10.1145/2486159.2486186">https://doi.org/10.1145/2486159.2486186</a>.'
  ieee: 'M. Eikel and C. Scheideler, “IRIS: A Robust Information System Against Insider
    DoS-Attacks,” in <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms
    and Architectures (SPAA)</i>, 2013, pp. 119–129.'
  mla: 'Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System
    Against Insider DoS-Attacks.” <i>Proceedings of the 25th ACM Symposium on Parallelism
    in Algorithms and Architectures (SPAA)</i>, 2013, pp. 119–29, doi:<a href="https://doi.org/10.1145/2486159.2486186">10.1145/2486159.2486186</a>.'
  short: 'M. Eikel, C. Scheideler, in: Proceedings of the 25th ACM Symposium on Parallelism
    in Algorithms and Architectures (SPAA), 2013, pp. 119–129.'
date_created: 2017-10-17T12:42:33Z
date_updated: 2022-01-06T07:01:42Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1145/2486159.2486186
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:38:34Z
  date_updated: 2018-03-15T10:38:34Z
  file_id: '1299'
  file_name: 519-iris-spaa2013_01.pdf
  file_size: 554618
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:38:34Z
has_accepted_license: '1'
page: 119-129
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and
  Architectures (SPAA)
status: public
title: 'IRIS: A Robust Information System Against Insider DoS-Attacks'
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '521'
author:
- first_name: Heinrich
  full_name: Riebler, Heinrich
  id: '8961'
  last_name: Riebler
citation:
  ama: Riebler H. <i>Identifikation und Wiederherstellung von kryptographischen Schlüsseln
    mit FPGAs</i>. Universität Paderborn; 2013.
  apa: Riebler, H. (2013). <i>Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs</i>. Universität Paderborn.
  bibtex: '@book{Riebler_2013, title={Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs}, publisher={Universität Paderborn}, author={Riebler, Heinrich},
    year={2013} }'
  chicago: Riebler, Heinrich. <i>Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs</i>. Universität Paderborn, 2013.
  ieee: H. Riebler, <i>Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs</i>. Universität Paderborn, 2013.
  mla: Riebler, Heinrich. <i>Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs</i>. Universität Paderborn, 2013.
  short: H. Riebler, Identifikation und Wiederherstellung von kryptographischen Schlüsseln
    mit FPGAs, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:34Z
date_updated: 2022-01-06T07:01:46Z
department:
- _id: '27'
- _id: '518'
keyword:
- coldboot
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '14'
  name: SFB 901 - Subprojekt C2
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
title: Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs
type: mastersthesis
user_id: '477'
year: '2013'
...
---
_id: '531'
author:
- first_name: Sascha
  full_name: Lutters, Sascha
  last_name: Lutters
citation:
  ama: Lutters S. <i>Entwurf eines datenschutzgerechten Reputationssystems</i>. Universität
    Paderborn; 2013.
  apa: Lutters, S. (2013). <i>Entwurf eines datenschutzgerechten Reputationssystems</i>.
    Universität Paderborn.
  bibtex: '@book{Lutters_2013, title={Entwurf eines datenschutzgerechten Reputationssystems},
    publisher={Universität Paderborn}, author={Lutters, Sascha}, year={2013} }'
  chicago: Lutters, Sascha. <i>Entwurf eines datenschutzgerechten Reputationssystems</i>.
    Universität Paderborn, 2013.
  ieee: S. Lutters, <i>Entwurf eines datenschutzgerechten Reputationssystems</i>.
    Universität Paderborn, 2013.
  mla: Lutters, Sascha. <i>Entwurf eines datenschutzgerechten Reputationssystems</i>.
    Universität Paderborn, 2013.
  short: S. Lutters, Entwurf eines datenschutzgerechten Reputationssystems, Universität
    Paderborn, 2013.
date_created: 2017-10-17T12:42:35Z
date_updated: 2022-01-06T07:01:49Z
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
title: Entwurf eines datenschutzgerechten Reputationssystems
type: mastersthesis
user_id: '477'
year: '2013'
...
---
_id: '532'
author:
- first_name: Hendrik
  full_name: Hilleckes, Hendrik
  last_name: Hilleckes
citation:
  ama: Hilleckes H. <i>Entwicklung und Analyse einer verteilten Speicherverwaltung
    für dynamische heterogene Speichersysteme</i>. Universität Paderborn; 2013.
  apa: Hilleckes, H. (2013). <i>Entwicklung und Analyse einer verteilten Speicherverwaltung
    für dynamische heterogene Speichersysteme</i>. Universität Paderborn.
  bibtex: '@book{Hilleckes_2013, title={Entwicklung und Analyse einer verteilten Speicherverwaltung
    für dynamische heterogene Speichersysteme}, publisher={Universität Paderborn},
    author={Hilleckes, Hendrik}, year={2013} }'
  chicago: Hilleckes, Hendrik. <i>Entwicklung und Analyse einer verteilten Speicherverwaltung
    für dynamische heterogene Speichersysteme</i>. Universität Paderborn, 2013.
  ieee: H. Hilleckes, <i>Entwicklung und Analyse einer verteilten Speicherverwaltung
    für dynamische heterogene Speichersysteme</i>. Universität Paderborn, 2013.
  mla: Hilleckes, Hendrik. <i>Entwicklung und Analyse einer verteilten Speicherverwaltung
    für dynamische heterogene Speichersysteme</i>. Universität Paderborn, 2013.
  short: H. Hilleckes, Entwicklung und Analyse einer verteilten Speicherverwaltung
    für dynamische heterogene Speichersysteme, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:36Z
date_updated: 2022-01-06T07:01:49Z
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
title: Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische
  heterogene Speichersysteme
type: bachelorsthesis
user_id: '477'
year: '2013'
...
---
_id: '538'
abstract:
- lang: eng
  text: 'We present a new technique to realize attribute-based encryption (ABE) schemes
    secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our
    approach is to extend certain concrete chosen-plaintext secure (CPA-secure) ABE
    schemes to achieve more efficient constructions than the known generic constructions
    of CCA-secure ABE schemes. We restrict ourselves to the construction of attribute-based
    key encapsulation mechanisms (KEMs) and present two concrete CCA-secure schemes:
    a key-policy attribute-based KEM that is based on Goyal''s key-policy ABE and
    a ciphertext-policy attribute-based KEM that is based on Waters'' ciphertext-policy
    ABE. To achieve our goals, we use an appropriate hash function and need to extend
    the public parameters and the ciphertexts of the underlying CPA-secure encryption
    schemes only by a single group element. Moreover, we use the same hardness assumptions
    as the underlying CPA-secure encryption schemes.'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: Blömer J, Liske G. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations
    without Random Oracles. 2013.
  apa: Blömer, J., &#38; Liske, G. (2013). Direct Chosen-Ciphertext Secure Attribute-Based
    Key Encapsulations without Random Oracles. Universität Paderborn.
  bibtex: '@article{Blömer_Liske_2013, title={Direct Chosen-Ciphertext Secure Attribute-Based
    Key Encapsulations without Random Oracles}, publisher={Universität Paderborn},
    author={Blömer, Johannes and Liske, Gennadij}, year={2013} }'
  chicago: Blömer, Johannes, and Gennadij Liske. “Direct Chosen-Ciphertext Secure
    Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn,
    2013.
  ieee: J. Blömer and G. Liske, “Direct Chosen-Ciphertext Secure Attribute-Based Key
    Encapsulations without Random Oracles.” Universität Paderborn, 2013.
  mla: Blömer, Johannes, and Gennadij Liske. <i>Direct Chosen-Ciphertext Secure Attribute-Based
    Key Encapsulations without Random Oracles</i>. Universität Paderborn, 2013.
  short: J. Blömer, G. Liske, (2013).
date_created: 2017-10-17T12:42:37Z
date_updated: 2022-01-06T07:01:51Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:35:04Z
  date_updated: 2018-03-15T10:35:04Z
  file_id: '1292'
  file_name: 538-AB-KEM_01.pdf
  file_size: 389797
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:35:04Z
has_accepted_license: '1'
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2013/646
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
title: Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without
  Random Oracles
type: preprint
user_id: '25078'
year: '2013'
...
---
_id: '542'
abstract:
- lang: eng
  text: 'We consider the problem of managing a dynamic heterogeneous storagesystem
    in a distributed way so that the amount of data assigned to a hostin that system
    is related to its capacity. Two central problems have to be solvedfor this: (1)
    organizing the hosts in an overlay network with low degree and diameterso that
    one can efficiently check the correct distribution of the data androute between
    any two hosts, and (2) distributing the data among the hosts so thatthe distribution
    respects the capacities of the hosts and can easily be adapted asthe set of hosts
    or their capacities change. We present distributed protocols forthese problems
    that are self-stabilizing and that do not need any global knowledgeabout the system
    such as the number of nodes or the overall capacity of thesystem. Prior to this
    work no solution was known satisfying these properties.'
author:
- first_name: Sebastian
  full_name: Kniesburges, Sebastian
  last_name: Kniesburges
- first_name: Andreas
  full_name: Koutsopoulos, Andreas
  last_name: Koutsopoulos
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Kniesburges S, Koutsopoulos A, Scheideler C. CONE-DHT: A distributed self-stabilizing
    algorithm for a heterogeneous storage system. In: <i>Proceedings of the 27th International
    Symposium on Distributed Computing (DISC)</i>. LNCS. ; 2013:537-549. doi:<a href="https://doi.org/10.1007/978-3-642-41527-2_37">10.1007/978-3-642-41527-2_37</a>'
  apa: 'Kniesburges, S., Koutsopoulos, A., &#38; Scheideler, C. (2013). CONE-DHT:
    A distributed self-stabilizing algorithm for a heterogeneous storage system. In
    <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>
    (pp. 537–549). <a href="https://doi.org/10.1007/978-3-642-41527-2_37">https://doi.org/10.1007/978-3-642-41527-2_37</a>'
  bibtex: '@inproceedings{Kniesburges_Koutsopoulos_Scheideler_2013, series={LNCS},
    title={CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous
    storage system}, DOI={<a href="https://doi.org/10.1007/978-3-642-41527-2_37">10.1007/978-3-642-41527-2_37</a>},
    booktitle={Proceedings of the 27th International Symposium on Distributed Computing
    (DISC)}, author={Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler,
    Christian}, year={2013}, pages={537–549}, collection={LNCS} }'
  chicago: 'Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler.
    “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage
    System.” In <i>Proceedings of the 27th International Symposium on Distributed
    Computing (DISC)</i>, 537–49. LNCS, 2013. <a href="https://doi.org/10.1007/978-3-642-41527-2_37">https://doi.org/10.1007/978-3-642-41527-2_37</a>.'
  ieee: 'S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “CONE-DHT: A distributed
    self-stabilizing algorithm for a heterogeneous storage system,” in <i>Proceedings
    of the 27th International Symposium on Distributed Computing (DISC)</i>, 2013,
    pp. 537–549.'
  mla: 'Kniesburges, Sebastian, et al. “CONE-DHT: A Distributed Self-Stabilizing Algorithm
    for a Heterogeneous Storage System.” <i>Proceedings of the 27th International
    Symposium on Distributed Computing (DISC)</i>, 2013, pp. 537–49, doi:<a href="https://doi.org/10.1007/978-3-642-41527-2_37">10.1007/978-3-642-41527-2_37</a>.'
  short: 'S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of the 27th
    International Symposium on Distributed Computing (DISC), 2013, pp. 537–549.'
date_created: 2017-10-17T12:42:38Z
date_updated: 2022-01-06T07:01:53Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1007/978-3-642-41527-2_37
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:32:48Z
  date_updated: 2018-03-15T10:32:48Z
  file_id: '1289'
  file_name: 542-CONE-DHT_A_distributed_self-stabilizing_algorithm_for_a_heterogeneous_storage_system.pdf
  file_size: 262302
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:32:48Z
has_accepted_license: '1'
page: 537-549
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 27th International Symposium on Distributed Computing
  (DISC)
series_title: LNCS
status: public
title: 'CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage
  system'
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '546'
abstract:
- lang: eng
  text: Self-stabilization is the property of a system to transfer itself regardless
    of the initial state into a legitimate state. Chord as a simple, decentralized
    and scalable distributed hash table is an ideal showcase to introduce self-stabilization
    for p2p overlays. In this paper, we present Re-Chord, a self-stabilizing version
    of Chord. We show, that the stabilization process is functional, but prone to
    strong churn. For that, we present Ca-Re-Chord, a churn resistant version of Re-Chord,
    that allows the creation of a useful DHT in any kind of graph regardless of the
    initial state. Simulation results attest the churn resistance and good performance
    of Ca-Re-Chord.
author:
- first_name: Kalman
  full_name: Graffi, Kalman
  last_name: Graffi
- first_name: Markus
  full_name: Benter, Markus
  last_name: Benter
- first_name: Mohammad
  full_name: Divband, Mohammad
  last_name: Divband
- first_name: Sebastian
  full_name: Kniesburges, Sebastian
  last_name: Kniesburges
- first_name: Andreas
  full_name: Koutsopoulos, Andreas
  last_name: Koutsopoulos
citation:
  ama: 'Graffi K, Benter M, Divband M, Kniesburges S, Koutsopoulos A. Ca-Re-Chord:
    A Churn Resistant Self-stabilizing Chord Overlay Network. In: <i>Proceedings of
    the Conference on Networked Systems (NetSys)</i>. ; 2013:27-34. doi:<a href="https://doi.org/10.1109/NetSys.2013.11">10.1109/NetSys.2013.11</a>'
  apa: 'Graffi, K., Benter, M., Divband, M., Kniesburges, S., &#38; Koutsopoulos,
    A. (2013). Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network.
    In <i>Proceedings of the Conference on Networked Systems (NetSys)</i> (pp. 27–34).
    <a href="https://doi.org/10.1109/NetSys.2013.11">https://doi.org/10.1109/NetSys.2013.11</a>'
  bibtex: '@inproceedings{Graffi_Benter_Divband_Kniesburges_Koutsopoulos_2013, title={Ca-Re-Chord:
    A Churn Resistant Self-stabilizing Chord Overlay Network}, DOI={<a href="https://doi.org/10.1109/NetSys.2013.11">10.1109/NetSys.2013.11</a>},
    booktitle={Proceedings of the Conference on Networked Systems (NetSys)}, author={Graffi,
    Kalman and Benter, Markus and Divband, Mohammad and Kniesburges, Sebastian and
    Koutsopoulos, Andreas}, year={2013}, pages={27–34} }'
  chicago: 'Graffi, Kalman, Markus Benter, Mohammad Divband, Sebastian Kniesburges,
    and Andreas Koutsopoulos. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord
    Overlay Network.” In <i>Proceedings of the Conference on Networked Systems (NetSys)</i>,
    27–34, 2013. <a href="https://doi.org/10.1109/NetSys.2013.11">https://doi.org/10.1109/NetSys.2013.11</a>.'
  ieee: 'K. Graffi, M. Benter, M. Divband, S. Kniesburges, and A. Koutsopoulos, “Ca-Re-Chord:
    A Churn Resistant Self-stabilizing Chord Overlay Network,” in <i>Proceedings of
    the Conference on Networked Systems (NetSys)</i>, 2013, pp. 27–34.'
  mla: 'Graffi, Kalman, et al. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord
    Overlay Network.” <i>Proceedings of the Conference on Networked Systems (NetSys)</i>,
    2013, pp. 27–34, doi:<a href="https://doi.org/10.1109/NetSys.2013.11">10.1109/NetSys.2013.11</a>.'
  short: 'K. Graffi, M. Benter, M. Divband, S. Kniesburges, A. Koutsopoulos, in: Proceedings
    of the Conference on Networked Systems (NetSys), 2013, pp. 27–34.'
date_created: 2017-10-17T12:42:38Z
date_updated: 2022-01-06T07:01:55Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/NetSys.2013.11
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:30:42Z
  date_updated: 2018-03-15T10:30:42Z
  file_id: '1286'
  file_name: 546-Kalman.Graffi_CaReChord.A.Churn.Resistant.Selfstabilizing.Chord.Overlay.Network_02.pdf
  file_size: 244841
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:30:42Z
has_accepted_license: '1'
page: 27-34
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '13'
  name: SFB 901 - Subproject C1
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the Conference on Networked Systems (NetSys)
status: public
title: 'Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network'
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '553'
author:
- first_name: Kathlén
  full_name: Kohn, Kathlén
  last_name: Kohn
citation:
  ama: Kohn K. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische
    Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn; 2013.
  apa: Kohn, K. (2013). <i>Attributbasierte Verschlüsselung mittels Gittermethoden
    - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität
    Paderborn.
  bibtex: '@book{Kohn_2013, title={Attributbasierte Verschlüsselung mittels Gittermethoden
    - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise}, publisher={Universität
    Paderborn}, author={Kohn, Kathlén}, year={2013} }'
  chicago: Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden
    - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität
    Paderborn, 2013.
  ieee: K. Kohn, <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische
    Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.
  mla: Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden -
    Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn,
    2013.
  short: K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische
    Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:40Z
date_updated: 2022-01-06T07:01:57Z
department:
- _id: '64'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen,
  Verfahren und Sicherheitsbeweise
type: bachelorsthesis
user_id: '477'
year: '2013'
...
---
_id: '561'
abstract:
- lang: eng
  text: 'We present a privacy-friendly architecture for a future cloud computing scenario
    where software licensing and software payment plays a major role. We show how
    digital rights management as a technical solution for software licensing can be
    achieved in a privacy-friendly manner. In our scenario, users who buy software
    from software providers and execute it at computing centres stay anonymous. At
    the same time, our approach guarantees that software licenses are bound to users
    and that their validity is checked before execution. Thus, DRM constitutes an
    incentive for software providers to take part in such a future cloud computing
    scenario. We employ a software re-encryption scheme so that computing centres
    are not able to build profiles of their users – not even under a pseudonym. We
    make sure that malicious users are unable to relay software to others. '
author:
- first_name: Ronald
  full_name: Petrlic, Ronald
  last_name: Petrlic
- first_name: Stephan
  full_name: Sekula, Stephan
  last_name: Sekula
- first_name: Christoph
  full_name: Sorge, Christoph
  last_name: Sorge
citation:
  ama: Petrlic R, Sekula S, Sorge C. A privacy-friendly Architecture for future Cloud
    Computing. <i>International Journal of Grid and Utility Computing</i>. 2013;(4):265-277.
    doi:<a href="https://doi.org/10.1504/IJGUC.2013.057120">10.1504/IJGUC.2013.057120</a>
  apa: Petrlic, R., Sekula, S., &#38; Sorge, C. (2013). A privacy-friendly Architecture
    for future Cloud Computing. <i>International Journal of Grid and Utility Computing</i>,
    (4), 265–277. <a href="https://doi.org/10.1504/IJGUC.2013.057120">https://doi.org/10.1504/IJGUC.2013.057120</a>
  bibtex: '@article{Petrlic_Sekula_Sorge_2013, title={A privacy-friendly Architecture
    for future Cloud Computing}, DOI={<a href="https://doi.org/10.1504/IJGUC.2013.057120">10.1504/IJGUC.2013.057120</a>},
    number={4}, journal={International Journal of Grid and Utility Computing}, publisher={InderScience},
    author={Petrlic, Ronald and Sekula, Stephan and Sorge, Christoph}, year={2013},
    pages={265–277} }'
  chicago: 'Petrlic, Ronald, Stephan Sekula, and Christoph Sorge. “A Privacy-Friendly
    Architecture for Future Cloud Computing.” <i>International Journal of Grid and
    Utility Computing</i>, no. 4 (2013): 265–77. <a href="https://doi.org/10.1504/IJGUC.2013.057120">https://doi.org/10.1504/IJGUC.2013.057120</a>.'
  ieee: R. Petrlic, S. Sekula, and C. Sorge, “A privacy-friendly Architecture for
    future Cloud Computing,” <i>International Journal of Grid and Utility Computing</i>,
    no. 4, pp. 265–277, 2013.
  mla: Petrlic, Ronald, et al. “A Privacy-Friendly Architecture for Future Cloud Computing.”
    <i>International Journal of Grid and Utility Computing</i>, no. 4, InderScience,
    2013, pp. 265–77, doi:<a href="https://doi.org/10.1504/IJGUC.2013.057120">10.1504/IJGUC.2013.057120</a>.
  short: R. Petrlic, S. Sekula, C. Sorge, International Journal of Grid and Utility
    Computing (2013) 265–277.
date_created: 2017-10-17T12:42:41Z
date_updated: 2022-01-06T07:02:07Z
ddc:
- '040'
doi: 10.1504/IJGUC.2013.057120
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:26:14Z
  date_updated: 2018-03-15T10:26:14Z
  file_id: '1280'
  file_name: 561-authorFinalVersion.pdf
  file_size: 1036554
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:26:14Z
has_accepted_license: '1'
issue: '4'
main_file_link:
- url: http://www.inderscience.com/offer.php?id=57120
page: 265-277
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: International Journal of Grid and Utility Computing
publisher: InderScience
status: public
title: A privacy-friendly Architecture for future Cloud Computing
type: journal_article
user_id: '477'
year: '2013'
...
---
_id: '528'
abstract:
- lang: eng
  text: Cold-boot attacks exploit the fact that DRAM contents are not immediately
    lost when a PC is powered off. Instead the contents decay rather slowly, in particular
    if the DRAM chips are cooled to low temperatures. This effect opens an attack
    vector on cryptographic applications that keep decrypted keys in DRAM. An attacker
    with access to the target computer can reboot it or remove the RAM modules and
    quickly copy the RAM contents to non-volatile memory. By exploiting the known
    cryptographic structure of the cipher and layout of the key data in memory, in
    our application an AES key schedule with redundancy, the resulting memory image
    can be searched for sections that could correspond to decayed cryptographic keys;
    then, the attacker can attempt to reconstruct the original key. However, the runtime
    of these algorithms grows rapidly with increasing memory image size, error rate
    and complexity of the bit error model, which limits the practicability of the
    approach.In this work, we study how the algorithm for key search can be accelerated
    with custom computing machines. We present an FPGA-based architecture on a Maxeler
    dataflow computing system that outperforms a software implementation up to 205x,
    which significantly improves the practicability of cold-attacks against AES.
author:
- first_name: Heinrich
  full_name: Riebler, Heinrich
  id: '8961'
  last_name: Riebler
- first_name: Tobias
  full_name: Kenter, Tobias
  id: '3145'
  last_name: Kenter
- first_name: Christoph
  full_name: Sorge, Christoph
  last_name: Sorge
- first_name: Christian
  full_name: Plessl, Christian
  id: '16153'
  last_name: Plessl
  orcid: 0000-0001-5728-9982
citation:
  ama: 'Riebler H, Kenter T, Sorge C, Plessl C. FPGA-accelerated Key Search for Cold-Boot
    Attacks against AES. In: <i>Proceedings of the International Conference on Field-Programmable
    Technology (FPT)</i>. IEEE; 2013:386-389. doi:<a href="https://doi.org/10.1109/FPT.2013.6718394">10.1109/FPT.2013.6718394</a>'
  apa: Riebler, H., Kenter, T., Sorge, C., &#38; Plessl, C. (2013). FPGA-accelerated
    Key Search for Cold-Boot Attacks against AES. <i>Proceedings of the International
    Conference on Field-Programmable Technology (FPT)</i>, 386–389. <a href="https://doi.org/10.1109/FPT.2013.6718394">https://doi.org/10.1109/FPT.2013.6718394</a>
  bibtex: '@inproceedings{Riebler_Kenter_Sorge_Plessl_2013, title={FPGA-accelerated
    Key Search for Cold-Boot Attacks against AES}, DOI={<a href="https://doi.org/10.1109/FPT.2013.6718394">10.1109/FPT.2013.6718394</a>},
    booktitle={Proceedings of the International Conference on Field-Programmable Technology
    (FPT)}, publisher={IEEE}, author={Riebler, Heinrich and Kenter, Tobias and Sorge,
    Christoph and Plessl, Christian}, year={2013}, pages={386–389} }'
  chicago: Riebler, Heinrich, Tobias Kenter, Christoph Sorge, and Christian Plessl.
    “FPGA-Accelerated Key Search for Cold-Boot Attacks against AES.” In <i>Proceedings
    of the International Conference on Field-Programmable Technology (FPT)</i>, 386–89.
    IEEE, 2013. <a href="https://doi.org/10.1109/FPT.2013.6718394">https://doi.org/10.1109/FPT.2013.6718394</a>.
  ieee: 'H. Riebler, T. Kenter, C. Sorge, and C. Plessl, “FPGA-accelerated Key Search
    for Cold-Boot Attacks against AES,” in <i>Proceedings of the International Conference
    on Field-Programmable Technology (FPT)</i>, 2013, pp. 386–389, doi: <a href="https://doi.org/10.1109/FPT.2013.6718394">10.1109/FPT.2013.6718394</a>.'
  mla: Riebler, Heinrich, et al. “FPGA-Accelerated Key Search for Cold-Boot Attacks
    against AES.” <i>Proceedings of the International Conference on Field-Programmable
    Technology (FPT)</i>, IEEE, 2013, pp. 386–89, doi:<a href="https://doi.org/10.1109/FPT.2013.6718394">10.1109/FPT.2013.6718394</a>.
  short: 'H. Riebler, T. Kenter, C. Sorge, C. Plessl, in: Proceedings of the International
    Conference on Field-Programmable Technology (FPT), IEEE, 2013, pp. 386–389.'
date_created: 2017-10-17T12:42:35Z
date_updated: 2023-09-26T13:37:35Z
ddc:
- '040'
department:
- _id: '27'
- _id: '518'
- _id: '78'
doi: 10.1109/FPT.2013.6718394
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:36:08Z
  date_updated: 2018-03-15T10:36:08Z
  file_id: '1294'
  file_name: 528-plessl13_fpt.pdf
  file_size: 822680
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:36:08Z
has_accepted_license: '1'
keyword:
- coldboot
language:
- iso: eng
page: 386-389
project:
- _id: '1'
  grant_number: '160364472'
  name: SFB 901
- _id: '14'
  grant_number: '160364472'
  name: SFB 901 - Subprojekt C2
- _id: '13'
  name: SFB 901 - Subproject C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '34'
  grant_number: '610996'
  name: Self-Adaptive Virtualisation-Aware High-Performance/Low-Energy Heterogeneous
    System Architectures
publication: Proceedings of the International Conference on Field-Programmable Technology
  (FPT)
publisher: IEEE
quality_controlled: '1'
status: public
title: FPGA-accelerated Key Search for Cold-Boot Attacks against AES
type: conference
user_id: '15278'
year: '2013'
...
---
_id: '577'
abstract:
- lang: eng
  text: 'SSS is an international forum for researchers and practitioners in the design
    and development of distributed systems with self-properties: (classical) self-stabilizing,
    self-configuring, self-organizing, self-managing, self-repairing, self-healing,
    self-optimizing, self-adaptive, and self-protecting. Research in distributed systems
    is now at a crucialpoint in its evolution, marked by the importance of dynamic
    systems such as peer-to-peer networks, large-scale wireless sensor networks, mobile
    ad hoc networks, cloud computing, robotic networks, etc. Moreover, new applications
    such as grid and web services, banking and e-commerce, e-health and robotics,
    aerospace and avionics, automotive, industrial process control, etc. have joined
    the traditional applications of distributed systems. The theory of self-stabilization
    has been enriched in the last 30 years by high quality research contributions
    in the areas of algorithmic techniques, formal methodologies, model theoretic
    issues, and composition techniques. All these areas are essential to the understanding
    and maintenance of self-properties in fault-tolerant distributed systems.'
citation:
  ama: Richa AW, Scheideler C, eds. <i>Stabilization, Safety, and Security of Distributed
    Systems</i>.; 2012. doi:<a href="https://doi.org/10.1007/978-3-642-33536-5">10.1007/978-3-642-33536-5</a>
  apa: Richa, A. W., &#38; Scheideler, C. (Eds.). (2012). <i>Stabilization, Safety,
    and Security of Distributed Systems</i>. Presented at the Stabilization, Safety,
    and Security of Distributed Systems (SSS), Paderborn, Germany. <a href="https://doi.org/10.1007/978-3-642-33536-5">https://doi.org/10.1007/978-3-642-33536-5</a>
  bibtex: '@book{Richa_Scheideler_2012, title={Stabilization, Safety, and Security
    of Distributed Systems}, DOI={<a href="https://doi.org/10.1007/978-3-642-33536-5">10.1007/978-3-642-33536-5</a>},
    year={2012} }'
  chicago: Richa, Andrea W., and Christian Scheideler, eds. <i>Stabilization, Safety,
    and Security of Distributed Systems</i>, 2012. <a href="https://doi.org/10.1007/978-3-642-33536-5">https://doi.org/10.1007/978-3-642-33536-5</a>.
  ieee: A. W. Richa and C. Scheideler, Eds., <i>Stabilization, Safety, and Security
    of Distributed Systems</i>. 2012.
  mla: Richa, Andrea W., and Christian Scheideler, editors. <i>Stabilization, Safety,
    and Security of Distributed Systems</i>. 2012, doi:<a href="https://doi.org/10.1007/978-3-642-33536-5">10.1007/978-3-642-33536-5</a>.
  short: A.W. Richa, C. Scheideler, eds., Stabilization, Safety, and Security of Distributed
    Systems, 2012.
conference:
  end_date: 2012-10-04
  location: Paderborn, Germany
  name: Stabilization, Safety, and Security of Distributed Systems (SSS)
  start_date: 2012-10-01
date_created: 2017-10-17T12:42:44Z
date_updated: 2022-01-06T07:02:39Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1007/978-3-642-33536-5
editor:
- first_name: Andrea W.
  full_name: Richa, Andrea W.
  last_name: Richa
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T13:09:19Z
  date_updated: 2018-03-21T13:09:19Z
  file_id: '1569'
  file_name: 577-SSS2012Richa-Scheideler.pdf
  file_size: 169564
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T13:09:19Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
status: public
title: Stabilization, Safety, and Security of Distributed Systems
type: conference_editor
user_id: '15504'
year: '2012'
...
---
_id: '581'
abstract:
- lang: eng
  text: 'Nanoparticles are getting more and more in the focus of the scientic community
    since the potential for the development of very small particles interacting with
    each other and completing medical and other tasks is getting bigger year by year.
    In this work we introduce a distributed local algorithm for arranging a set of
    nanoparticles on the discrete plane into specic geometric shapes, for instance
    a rectangle. The concept of a particle we use can be seen as a simple mobile robot
    with the following restrictions: it can only view the state of robots it is physically
    connected to, is anonymous, has only a constant size memory, can only move by
    using other particles as an anchor point on which it pulls itself alongside, and
    it operates in Look-Compute-Move cycles. The main result of this work is the presentation
    of a random distributed local algorithm which transforms any given connected set
    of particles into a particular geometric shape. As an example we provide a version
    of this algorithm for forming a rectangle with an arbitrary predened aspect ratio.
    To the best of our knowledge this is the rst work that considers arrangement problems
    for these types of robots.'
author:
- first_name: Maximilian
  full_name: Drees, Maximilian
  last_name: Drees
- first_name: Martina
  full_name: 'Hüllmann (married name: Eikel), Martina'
  last_name: 'Hüllmann (married name: Eikel)'
- first_name: Andreas
  full_name: Koutsopoulos, Andreas
  last_name: Koutsopoulos
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Drees M, Hüllmann (married name: Eikel) M, Koutsopoulos A, Scheideler C. Self-Organizing
    Particle Systems. In: <i>Proceedings of the 26th IEEE International Parallel and
    Distributed Processing Symposium (IPDPS)</i>. ; 2012:1272-1283. doi:<a href="https://doi.org/10.1109/IPDPS.2012.116">10.1109/IPDPS.2012.116</a>'
  apa: 'Drees, M., Hüllmann (married name: Eikel), M., Koutsopoulos, A., &#38; Scheideler,
    C. (2012). Self-Organizing Particle Systems. In <i>Proceedings of the 26th IEEE
    International Parallel and Distributed Processing Symposium (IPDPS)</i> (pp. 1272–1283).
    <a href="https://doi.org/10.1109/IPDPS.2012.116">https://doi.org/10.1109/IPDPS.2012.116</a>'
  bibtex: '@inproceedings{Drees_Hüllmann (married name: Eikel)_Koutsopoulos_Scheideler_2012,
    title={Self-Organizing Particle Systems}, DOI={<a href="https://doi.org/10.1109/IPDPS.2012.116">10.1109/IPDPS.2012.116</a>},
    booktitle={Proceedings of the 26th IEEE International Parallel and Distributed
    Processing Symposium (IPDPS)}, author={Drees, Maximilian and Hüllmann (married
    name: Eikel), Martina and Koutsopoulos, Andreas and Scheideler, Christian}, year={2012},
    pages={1272–1283} }'
  chicago: 'Drees, Maximilian, Martina Hüllmann (married name: Eikel), Andreas Koutsopoulos,
    and Christian Scheideler. “Self-Organizing Particle Systems.” In <i>Proceedings
    of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS)</i>,
    1272–83, 2012. <a href="https://doi.org/10.1109/IPDPS.2012.116">https://doi.org/10.1109/IPDPS.2012.116</a>.'
  ieee: 'M. Drees, M. Hüllmann (married name: Eikel), A. Koutsopoulos, and C. Scheideler,
    “Self-Organizing Particle Systems,” in <i>Proceedings of the 26th IEEE International
    Parallel and Distributed Processing Symposium (IPDPS)</i>, 2012, pp. 1272–1283.'
  mla: Drees, Maximilian, et al. “Self-Organizing Particle Systems.” <i>Proceedings
    of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS)</i>,
    2012, pp. 1272–83, doi:<a href="https://doi.org/10.1109/IPDPS.2012.116">10.1109/IPDPS.2012.116</a>.
  short: 'M. Drees, M. Hüllmann (married name: Eikel), A. Koutsopoulos, C. Scheideler,
    in: Proceedings of the 26th IEEE International Parallel and Distributed Processing
    Symposium (IPDPS), 2012, pp. 1272–1283.'
date_created: 2017-10-17T12:42:45Z
date_updated: 2022-01-06T07:02:42Z
ddc:
- '040'
department:
- _id: '79'
- _id: '63'
doi: 10.1109/IPDPS.2012.116
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T08:39:33Z
  date_updated: 2018-03-15T08:39:33Z
  file_id: '1263'
  file_name: 581-IPDPS2012-Scheideler_Huellmann.pdf
  file_size: 373131
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T08:39:33Z
has_accepted_license: '1'
language:
- iso: eng
page: 1272-1283
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 26th IEEE International Parallel and Distributed Processing
  Symposium (IPDPS)
status: public
title: Self-Organizing Particle Systems
type: conference
user_id: '14955'
year: '2012'
...
---
_id: '585'
abstract:
- lang: eng
  text: In a cloud-computing scenario where users buy software from software providers
    and execute it at computing centers, a digital rights management (DRM) system
    has to be in place to check the software licenses during each software execution.
    However, the exposure of users to privacy invasion in the presence of DRM systems
    is problematic.We come up with a concept that unites software providers' and users'
    demands for a secure and privacy-preserving DRM system for cloud computing. The
    employment of proxy re-encryption allows for a prevention of profile building
    (under pseudonym) of users by any party.
author:
- first_name: Ronald
  full_name: Petrlic, Ronald
  last_name: Petrlic
citation:
  ama: 'Petrlic R. Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM
    Scheme. In: <i>Proceedings of 4th International Symposium on Cyberspace Safety
    and Security (CSS)</i>. LNCS. ; 2012:194-211. doi:<a href="https://doi.org/10.1007/978-3-642-35362-8_16">10.1007/978-3-642-35362-8_16</a>'
  apa: Petrlic, R. (2012). Proxy Re-Encryption in a Privacy-Preserving Cloud Computing
    DRM Scheme. In <i>Proceedings of 4th International Symposium on Cyberspace Safety
    and Security (CSS)</i> (pp. 194–211). <a href="https://doi.org/10.1007/978-3-642-35362-8_16">https://doi.org/10.1007/978-3-642-35362-8_16</a>
  bibtex: '@inproceedings{Petrlic_2012, series={LNCS}, title={Proxy Re-Encryption
    in a Privacy-Preserving Cloud Computing DRM Scheme}, DOI={<a href="https://doi.org/10.1007/978-3-642-35362-8_16">10.1007/978-3-642-35362-8_16</a>},
    booktitle={Proceedings of 4th International Symposium on Cyberspace Safety and
    Security (CSS)}, author={Petrlic, Ronald}, year={2012}, pages={194–211}, collection={LNCS}
    }'
  chicago: Petrlic, Ronald. “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing
    DRM Scheme.” In <i>Proceedings of 4th International Symposium on Cyberspace Safety
    and Security (CSS)</i>, 194–211. LNCS, 2012. <a href="https://doi.org/10.1007/978-3-642-35362-8_16">https://doi.org/10.1007/978-3-642-35362-8_16</a>.
  ieee: R. Petrlic, “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM
    Scheme,” in <i>Proceedings of 4th International Symposium on Cyberspace Safety
    and Security (CSS)</i>, 2012, pp. 194–211.
  mla: Petrlic, Ronald. “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing
    DRM Scheme.” <i>Proceedings of 4th International Symposium on Cyberspace Safety
    and Security (CSS)</i>, 2012, pp. 194–211, doi:<a href="https://doi.org/10.1007/978-3-642-35362-8_16">10.1007/978-3-642-35362-8_16</a>.
  short: 'R. Petrlic, in: Proceedings of 4th International Symposium on Cyberspace
    Safety and Security (CSS), 2012, pp. 194–211.'
date_created: 2017-10-17T12:42:46Z
date_updated: 2022-01-06T07:02:43Z
ddc:
- '040'
doi: 10.1007/978-3-642-35362-8_16
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T08:38:58Z
  date_updated: 2018-03-15T08:38:58Z
  file_id: '1262'
  file_name: 585-privacy-drm-cloud-1-css-camera-ready.pdf
  file_size: 582557
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T08:38:58Z
has_accepted_license: '1'
page: 194-211
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of 4th International Symposium on Cyberspace Safety and Security
  (CSS)
series_title: LNCS
status: public
title: Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme
type: conference
user_id: '15504'
year: '2012'
...
---
_id: '588'
abstract:
- lang: eng
  text: We come up with a digital rights management (DRM) concept for cloud computing
    and show how license management for software within the cloud can be achieved
    in a privacy-friendly manner. In our scenario, users who buy software from software
    providers stay anonymous. At the same time, our approach guarantees that software
    licenses are bound to users and their validity is checked before execution. We
    employ a software re-encryption scheme so that computing centers which execute
    users’ software are not able to build user profiles—not even under pseudonym—of
    their users. We combine secret sharing and homomorphic encryption. We make sure
    that malicious users are unable to relay software to others. DRM constitutes an
    incentive for software providers to take part in a future cloud computing scenario.We
    make this scenario more attractive for users by preserving their privacy.
author:
- first_name: Ronald
  full_name: Petrlic, Ronald
  last_name: Petrlic
- first_name: Christoph
  full_name: Sorge, Christoph
  last_name: Sorge
citation:
  ama: 'Petrlic R, Sorge C. Privacy-Preserving DRM for Cloud Computing. In: <i>Proceedings
    of the 26th IEEE International Conference on Advanced Information Networking and
    Applications (AINA)</i>. ; 2012:1286-1291. doi:<a href="https://doi.org/10.1109/WAINA.2012.92">10.1109/WAINA.2012.92</a>'
  apa: Petrlic, R., &#38; Sorge, C. (2012). Privacy-Preserving DRM for Cloud Computing.
    In <i>Proceedings of the 26th IEEE International Conference on Advanced Information
    Networking and Applications (AINA)</i> (pp. 1286–1291). <a href="https://doi.org/10.1109/WAINA.2012.92">https://doi.org/10.1109/WAINA.2012.92</a>
  bibtex: '@inproceedings{Petrlic_Sorge_2012, title={Privacy-Preserving DRM for Cloud
    Computing}, DOI={<a href="https://doi.org/10.1109/WAINA.2012.92">10.1109/WAINA.2012.92</a>},
    booktitle={Proceedings of the 26th IEEE International Conference on Advanced Information
    Networking and Applications (AINA)}, author={Petrlic, Ronald and Sorge, Christoph},
    year={2012}, pages={1286–1291} }'
  chicago: Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving DRM for Cloud
    Computing.” In <i>Proceedings of the 26th IEEE International Conference on Advanced
    Information Networking and Applications (AINA)</i>, 1286–91, 2012. <a href="https://doi.org/10.1109/WAINA.2012.92">https://doi.org/10.1109/WAINA.2012.92</a>.
  ieee: R. Petrlic and C. Sorge, “Privacy-Preserving DRM for Cloud Computing,” in
    <i>Proceedings of the 26th IEEE International Conference on Advanced Information
    Networking and Applications (AINA)</i>, 2012, pp. 1286–1291.
  mla: Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving DRM for Cloud Computing.”
    <i>Proceedings of the 26th IEEE International Conference on Advanced Information
    Networking and Applications (AINA)</i>, 2012, pp. 1286–91, doi:<a href="https://doi.org/10.1109/WAINA.2012.92">10.1109/WAINA.2012.92</a>.
  short: 'R. Petrlic, C. Sorge, in: Proceedings of the 26th IEEE International Conference
    on Advanced Information Networking and Applications (AINA), 2012, pp. 1286–1291.'
date_created: 2017-10-17T12:42:46Z
date_updated: 2022-01-06T07:02:45Z
ddc:
- '040'
doi: 10.1109/WAINA.2012.92
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T08:36:16Z
  date_updated: 2018-03-15T08:36:16Z
  file_id: '1259'
  file_name: 588-drm0-published_01.pdf
  file_size: 194323
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T08:36:16Z
has_accepted_license: '1'
page: 1286-1291
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 26th IEEE International Conference on Advanced Information
  Networking and Applications (AINA)
status: public
title: Privacy-Preserving DRM for Cloud Computing
type: conference
user_id: '15504'
year: '2012'
...
