---
_id: '589'
abstract:
- lang: eng
  text: We present a privacy-preserving DRM scheme for a (future) cloud computing
    software market. In such a market, applications are packed into virtual machines
    (VMs) by software providers and the VMs can be executed at any computing center
    within the cloud. We propose the introduction of a software TPM as a container
    for VM-specific keys within the VM that moves around with the VM within the cloud.
    The software TPM is coupled to a virtual TPM at a computing center to constitute
    the root of trust for a local DRM enforcement system within the VM that checks
    the license before each application execution. This allows flexible price models,
    e.g. execute at most n timeslike models. Users have proof that their personally
    identifiable information, stored and processed within the VM at a computing center,
    cannot be obtained by the computing center. A feature of our solution is that
    neither software provider nor computing center are able to build usage profiles
    of the software executions.
author:
- first_name: Ronald
  full_name: Petrlic, Ronald
  last_name: Petrlic
citation:
  ama: 'Petrlic R. Privacy-Preserving Digital Rights Management in a Trusted Cloud
    Environment. In: <i>Proceedings of the 11th IEEE International Conference on Trust,
    Security and Privacy in Computing and Communications (TrustCom)</i>. ; 2012:958-963.
    doi:<a href="https://doi.org/10.1109/TrustCom.2012.225">10.1109/TrustCom.2012.225</a>'
  apa: Petrlic, R. (2012). Privacy-Preserving Digital Rights Management in a Trusted
    Cloud Environment. In <i>Proceedings of the 11th IEEE International Conference
    on Trust, Security and Privacy in Computing and Communications (TrustCom)</i>
    (pp. 958–963). <a href="https://doi.org/10.1109/TrustCom.2012.225">https://doi.org/10.1109/TrustCom.2012.225</a>
  bibtex: '@inproceedings{Petrlic_2012, title={Privacy-Preserving Digital Rights Management
    in a Trusted Cloud Environment}, DOI={<a href="https://doi.org/10.1109/TrustCom.2012.225">10.1109/TrustCom.2012.225</a>},
    booktitle={Proceedings of the 11th IEEE International Conference on Trust, Security
    and Privacy in Computing and Communications (TrustCom)}, author={Petrlic, Ronald},
    year={2012}, pages={958–963} }'
  chicago: Petrlic, Ronald. “Privacy-Preserving Digital Rights Management in a Trusted
    Cloud Environment.” In <i>Proceedings of the 11th IEEE International Conference
    on Trust, Security and Privacy in Computing and Communications (TrustCom)</i>,
    958–63, 2012. <a href="https://doi.org/10.1109/TrustCom.2012.225">https://doi.org/10.1109/TrustCom.2012.225</a>.
  ieee: R. Petrlic, “Privacy-Preserving Digital Rights Management in a Trusted Cloud
    Environment,” in <i>Proceedings of the 11th IEEE International Conference on Trust,
    Security and Privacy in Computing and Communications (TrustCom)</i>, 2012, pp.
    958–963.
  mla: Petrlic, Ronald. “Privacy-Preserving Digital Rights Management in a Trusted
    Cloud Environment.” <i>Proceedings of the 11th IEEE International Conference on
    Trust, Security and Privacy in Computing and Communications (TrustCom)</i>, 2012,
    pp. 958–63, doi:<a href="https://doi.org/10.1109/TrustCom.2012.225">10.1109/TrustCom.2012.225</a>.
  short: 'R. Petrlic, in: Proceedings of the 11th IEEE International Conference on
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2012,
    pp. 958–963.'
date_created: 2017-10-17T12:42:47Z
date_updated: 2022-01-06T07:02:45Z
ddc:
- '040'
doi: 10.1109/TrustCom.2012.225
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T08:40:15Z
  date_updated: 2018-03-15T08:40:15Z
  file_id: '1264'
  file_name: 589-published-trustcom.pdf
  file_size: 179985
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T08:40:15Z
has_accepted_license: '1'
language:
- iso: eng
page: 958-963
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 11th IEEE International Conference on Trust, Security
  and Privacy in Computing and Communications (TrustCom)
status: public
title: Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment
type: conference
user_id: '477'
year: '2012'
...
---
_id: '606'
author:
- first_name: Nils
  full_name: Löken, Nils
  id: '13703'
  last_name: Löken
citation:
  ama: Löken N. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen
    auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>.
    Universität Paderborn; 2012.
  apa: Löken, N. (2012). <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis
    für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>.
    Universität Paderborn.
  bibtex: '@book{Löken_2012, title={Identitätsbasierte Signaturen - Ein Sicherheitsbeweis
    für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas},
    publisher={Universität Paderborn}, author={Löken, Nils}, year={2012} }'
  chicago: Löken, Nils. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für
    Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>.
    Universität Paderborn, 2012.
  ieee: N. Löken, <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen
    auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>.
    Universität Paderborn, 2012.
  mla: Löken, Nils. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen
    auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>.
    Universität Paderborn, 2012.
  short: N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen
    auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas, Universität
    Paderborn, 2012.
date_created: 2017-10-17T12:42:50Z
date_updated: 2022-01-06T07:02:51Z
department:
- _id: '64'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage
  von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas
type: bachelorsthesis
user_id: '13703'
year: '2012'
...
---
_id: '607'
author:
- first_name: Thomas
  full_name: Haarhoff, Thomas
  last_name: Haarhoff
citation:
  ama: Haarhoff T. <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen
    für Körper der Charakteristik 2</i>. Universität Paderborn; 2012.
  apa: Haarhoff, T. (2012). <i>Identitätsbasierte Kryptographie - Implementierung
    von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn.
  bibtex: '@book{Haarhoff_2012, title={Identitätsbasierte Kryptographie - Implementierung
    von Paarungen für Körper der Charakteristik 2}, publisher={Universität Paderborn},
    author={Haarhoff, Thomas}, year={2012} }'
  chicago: Haarhoff, Thomas. <i>Identitätsbasierte Kryptographie - Implementierung
    von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn, 2012.
  ieee: T. Haarhoff, <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen
    für Körper der Charakteristik 2</i>. Universität Paderborn, 2012.
  mla: Haarhoff, Thomas. <i>Identitätsbasierte Kryptographie - Implementierung von
    Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn, 2012.
  short: T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen
    für Körper der Charakteristik 2, Universität Paderborn, 2012.
date_created: 2017-10-17T12:42:50Z
date_updated: 2022-01-06T07:02:51Z
department:
- _id: '64'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper
  der Charakteristik 2
type: bachelorsthesis
user_id: '477'
year: '2012'
...
---
_id: '620'
author:
- first_name: Robert
  full_name: Mittendorf, Robert
  last_name: Mittendorf
citation:
  ama: Mittendorf R. <i>Datenschutzgerechtes DRM im Cloud Computing</i>. Universität
    Paderborn; 2012.
  apa: Mittendorf, R. (2012). <i>Datenschutzgerechtes DRM im Cloud Computing</i>.
    Universität Paderborn.
  bibtex: '@book{Mittendorf_2012, title={Datenschutzgerechtes DRM im Cloud Computing},
    publisher={Universität Paderborn}, author={Mittendorf, Robert}, year={2012} }'
  chicago: Mittendorf, Robert. <i>Datenschutzgerechtes DRM im Cloud Computing</i>.
    Universität Paderborn, 2012.
  ieee: R. Mittendorf, <i>Datenschutzgerechtes DRM im Cloud Computing</i>. Universität
    Paderborn, 2012.
  mla: Mittendorf, Robert. <i>Datenschutzgerechtes DRM im Cloud Computing</i>. Universität
    Paderborn, 2012.
  short: R. Mittendorf, Datenschutzgerechtes DRM im Cloud Computing, Universität Paderborn,
    2012.
date_created: 2017-10-17T12:42:52Z
date_updated: 2022-01-06T07:02:56Z
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
title: Datenschutzgerechtes DRM im Cloud Computing
type: bachelorsthesis
user_id: '477'
year: '2012'
...
---
_id: '621'
author:
- first_name: Stephan
  full_name: Sekula, Stephan
  last_name: Sekula
citation:
  ama: Sekula S. <i>Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing</i>.
    Universität Paderborn; 2012.
  apa: Sekula, S. (2012). <i>Datenschutzgerechte E-Payment-Schemata im On-The-Fly
    Computing</i>. Universität Paderborn.
  bibtex: '@book{Sekula_2012, title={Datenschutzgerechte E-Payment-Schemata im On-The-Fly
    Computing}, publisher={Universität Paderborn}, author={Sekula, Stephan}, year={2012}
    }'
  chicago: Sekula, Stephan. <i>Datenschutzgerechte E-Payment-Schemata im On-The-Fly
    Computing</i>. Universität Paderborn, 2012.
  ieee: S. Sekula, <i>Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing</i>.
    Universität Paderborn, 2012.
  mla: Sekula, Stephan. <i>Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing</i>.
    Universität Paderborn, 2012.
  short: S. Sekula, Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing,
    Universität Paderborn, 2012.
date_created: 2017-10-17T12:42:53Z
date_updated: 2022-01-06T07:02:57Z
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
title: Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing
type: bachelorsthesis
user_id: '477'
year: '2012'
...
---
_id: '623'
abstract:
- lang: eng
  text: 'This paper initiates the formal study of a fundamental problem: How to efficiently
    allocate a shared communication medium among a set of K co-existing networks in
    the presence of arbitrary external interference? While most literature on medium
    access focuses on how to share a medium among nodes, these approaches are often
    either not directly applicable to co-existing networks as they would violate the
    independence requirement, or they yield a low throughput if applied to multiple
    networks. We present the randomized medium access (MAC) protocol COMAC which guarantees
    that a given communication channel is shared fairly among competing and independent
    networks, and that the available bandwidth is used efficiently. These performance
    guarantees hold in the presence of arbitrary external interference or even under
    adversarial jamming. Concretely, we show that the co-existing networks can use
    a Ω(ε2 min{ε, 1/poly(K)})-fraction of the non-jammed time steps for successful
    message transmissions, where ε is the (arbitrarily distributed) fraction of time
    which is not jammed.'
author:
- first_name: Andrea W.
  full_name: Richa, Andrea W.
  last_name: Richa
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
- first_name: Stefan
  full_name: Schmid, Stefan
  last_name: Schmid
- first_name: 'Jin '
  full_name: 'Zhang, Jin '
  last_name: Zhang
citation:
  ama: 'Richa AW, Scheideler C, Schmid S, Zhang J. Competitive and fair throughput
    for co-existing networks under adversarial interference. In: <i>Proceedings of
    the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing
    (PODC)</i>. ; 2012:291-300. doi:<a href="https://doi.org/10.1145/2332432.2332488">10.1145/2332432.2332488</a>'
  apa: Richa, A. W., Scheideler, C., Schmid, S., &#38; Zhang, J. (2012). Competitive
    and fair throughput for co-existing networks under adversarial interference. In
    <i>Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and
    Distributed Computing (PODC)</i> (pp. 291–300). <a href="https://doi.org/10.1145/2332432.2332488">https://doi.org/10.1145/2332432.2332488</a>
  bibtex: '@inproceedings{Richa_Scheideler_Schmid_Zhang_2012, title={Competitive and
    fair throughput for co-existing networks under adversarial interference}, DOI={<a
    href="https://doi.org/10.1145/2332432.2332488">10.1145/2332432.2332488</a>}, booktitle={Proceedings
    of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing
    (PODC)}, author={Richa, Andrea W. and Scheideler, Christian and Schmid, Stefan
    and Zhang, Jin }, year={2012}, pages={291–300} }'
  chicago: Richa, Andrea W., Christian Scheideler, Stefan Schmid, and Jin  Zhang.
    “Competitive and Fair Throughput for Co-Existing Networks under Adversarial Interference.”
    In <i>Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles
    and Distributed Computing (PODC)</i>, 291–300, 2012. <a href="https://doi.org/10.1145/2332432.2332488">https://doi.org/10.1145/2332432.2332488</a>.
  ieee: A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Competitive and fair
    throughput for co-existing networks under adversarial interference,” in <i>Proceedings
    of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing
    (PODC)</i>, 2012, pp. 291–300.
  mla: Richa, Andrea W., et al. “Competitive and Fair Throughput for Co-Existing Networks
    under Adversarial Interference.” <i>Proceedings of the 31st Annual ACM SIGACT-SIGOPS
    Symposium on Principles and Distributed Computing (PODC)</i>, 2012, pp. 291–300,
    doi:<a href="https://doi.org/10.1145/2332432.2332488">10.1145/2332432.2332488</a>.
  short: 'A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, in: Proceedings of the 31st
    Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC),
    2012, pp. 291–300.'
date_created: 2017-10-17T12:42:53Z
date_updated: 2022-01-06T07:02:58Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1145/2332432.2332488
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T06:45:25Z
  date_updated: 2018-03-15T06:45:25Z
  file_id: '1241'
  file_name: 623-PODC-2012_01.pdf
  file_size: 210382
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T06:45:25Z
has_accepted_license: '1'
page: 291-300
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles
  and Distributed Computing (PODC)
status: public
title: Competitive and fair throughput for co-existing networks under adversarial
  interference
type: conference
user_id: '15504'
year: '2012'
...
---
_id: '629'
author:
- first_name: Patrick
  full_name: Schleiter, Patrick
  last_name: Schleiter
citation:
  ama: Schleiter P. <i>Attribute-basierte Verschlüsselung</i>. Universität Paderborn;
    2012.
  apa: Schleiter, P. (2012). <i>Attribute-basierte Verschlüsselung</i>. Universität
    Paderborn.
  bibtex: '@book{Schleiter_2012, title={Attribute-basierte Verschlüsselung}, publisher={Universität
    Paderborn}, author={Schleiter, Patrick}, year={2012} }'
  chicago: Schleiter, Patrick. <i>Attribute-basierte Verschlüsselung</i>. Universität
    Paderborn, 2012.
  ieee: P. Schleiter, <i>Attribute-basierte Verschlüsselung</i>. Universität Paderborn,
    2012.
  mla: Schleiter, Patrick. <i>Attribute-basierte Verschlüsselung</i>. Universität
    Paderborn, 2012.
  short: P. Schleiter, Attribute-basierte Verschlüsselung, Universität Paderborn,
    2012.
date_created: 2017-10-17T12:42:54Z
date_updated: 2022-01-06T07:03:00Z
department:
- _id: '64'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Attribute-basierte Verschlüsselung
type: bachelorsthesis
user_id: '477'
year: '2012'
...
---
_id: '645'
abstract:
- lang: eng
  text: In the standard consensus problem there are n processes with possibly di®erent
    input values and the goal is to eventually reach a point at which all processes
    commit to exactly one of these values. We are studying a slight variant of the
    consensus problem called the stabilizing consensus problem [2]. In this problem,
    we do not require that each process commits to a ¯nal value at some point, but
    that eventually they arrive at a common, stable value without necessarily being
    aware of that. This should work irrespective of the states in which the processes
    are starting. Our main result is a simple randomized algorithm called median rule
    that, with high probability, just needs O(logmlog log n + log n) time and work
    per process to arrive at an almost stable consensus for any set of m legal values
    as long as an adversary can corrupt the states of at most p n processes at any
    time. Without adversarial involvement, just O(log n) time and work is needed for
    a stable consensus, with high probability. As a by-product, we obtain a simple
    distributed algorithm for approximating the median of n numbers in time O(logmlog
    log n + log n) under adversarial presence.
author:
- first_name: Benjamin
  full_name: Doerr, Benjamin
  last_name: Doerr
- first_name: Leslie Ann
  full_name: Goldberg, Leslie Ann
  last_name: Goldberg
- first_name: Lorenz
  full_name: Minder, Lorenz
  last_name: Minder
- first_name: Thomas
  full_name: Sauerwald, Thomas
  last_name: Sauerwald
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Doerr B, Goldberg LA, Minder L, Sauerwald T, Scheideler C. Stabilizing consensus
    with the power of two choices. In: <i>Proceedings of the 23rd ACM Symposium on
    Parallelism in Algorithms and Architectures (SPAA)</i>. ; 2011:149-158. doi:<a
    href="https://doi.org/10.1145/1989493.1989516">10.1145/1989493.1989516</a>'
  apa: Doerr, B., Goldberg, L. A., Minder, L., Sauerwald, T., &#38; Scheideler, C.
    (2011). Stabilizing consensus with the power of two choices. In <i>Proceedings
    of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>
    (pp. 149–158). <a href="https://doi.org/10.1145/1989493.1989516">https://doi.org/10.1145/1989493.1989516</a>
  bibtex: '@inproceedings{Doerr_Goldberg_Minder_Sauerwald_Scheideler_2011, title={Stabilizing
    consensus with the power of two choices}, DOI={<a href="https://doi.org/10.1145/1989493.1989516">10.1145/1989493.1989516</a>},
    booktitle={Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms
    and Architectures (SPAA)}, author={Doerr, Benjamin and Goldberg, Leslie Ann and
    Minder, Lorenz and Sauerwald, Thomas and Scheideler, Christian}, year={2011},
    pages={149–158} }'
  chicago: Doerr, Benjamin, Leslie Ann Goldberg, Lorenz Minder, Thomas Sauerwald,
    and Christian Scheideler. “Stabilizing Consensus with the Power of Two Choices.”
    In <i>Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures
    (SPAA)</i>, 149–58, 2011. <a href="https://doi.org/10.1145/1989493.1989516">https://doi.org/10.1145/1989493.1989516</a>.
  ieee: B. Doerr, L. A. Goldberg, L. Minder, T. Sauerwald, and C. Scheideler, “Stabilizing
    consensus with the power of two choices,” in <i>Proceedings of the 23rd ACM Symposium
    on Parallelism in Algorithms and Architectures (SPAA)</i>, 2011, pp. 149–158.
  mla: Doerr, Benjamin, et al. “Stabilizing Consensus with the Power of Two Choices.”
    <i>Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures
    (SPAA)</i>, 2011, pp. 149–58, doi:<a href="https://doi.org/10.1145/1989493.1989516">10.1145/1989493.1989516</a>.
  short: 'B. Doerr, L.A. Goldberg, L. Minder, T. Sauerwald, C. Scheideler, in: Proceedings
    of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA),
    2011, pp. 149–158.'
date_created: 2017-10-17T12:42:57Z
date_updated: 2022-01-06T07:03:05Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1145/1989493.1989516
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-14T13:58:11Z
  date_updated: 2018-03-14T13:58:11Z
  file_id: '1228'
  file_name: 645-spaa70-scheideler.pdf
  file_size: 268500
  relation: main_file
  success: 1
file_date_updated: 2018-03-14T13:58:11Z
has_accepted_license: '1'
page: 149-158
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and
  Architectures (SPAA)
status: public
title: Stabilizing consensus with the power of two choices
type: conference
user_id: '15504'
year: '2011'
...
---
_id: '646'
abstract:
- lang: eng
  text: This paper presents a dynamic overlay network based on the De Bruijn graph
    which we call Linearized De Bruijn (LDB) network. The LDB network has the advantage
    that it has a guaranteed constant node degree and that the routing between any
    two nodes takes at most O(log n) hops with high probability. Also, we show that
    there is a simple local-control algorithm that can recover the LDB network from
    any network topology that is weakly connected.
author:
- first_name: Andrea W.
  full_name: Richa, Andrea W.
  last_name: Richa
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Richa AW, Scheideler C. Self-Stabilizing DeBruijn Networks. In: <i>Proceedings
    of the 13th International Symposium on Stabilization, Safety, and Security of
    Distributed Systems (SSS)</i>. LNCS. ; 2011:416-430. doi:<a href="https://doi.org/10.1007/978-3-642-24550-3_31">10.1007/978-3-642-24550-3_31</a>'
  apa: Richa, A. W., &#38; Scheideler, C. (2011). Self-Stabilizing DeBruijn Networks.
    In <i>Proceedings of the 13th International Symposium on Stabilization, Safety,
    and Security of Distributed Systems (SSS)</i> (pp. 416–430). <a href="https://doi.org/10.1007/978-3-642-24550-3_31">https://doi.org/10.1007/978-3-642-24550-3_31</a>
  bibtex: '@inproceedings{Richa_Scheideler_2011, series={LNCS}, title={Self-Stabilizing
    DeBruijn Networks}, DOI={<a href="https://doi.org/10.1007/978-3-642-24550-3_31">10.1007/978-3-642-24550-3_31</a>},
    booktitle={Proceedings of the 13th International Symposium on Stabilization, Safety,
    and Security of Distributed Systems (SSS)}, author={Richa, Andrea W. and Scheideler,
    Christian}, year={2011}, pages={416–430}, collection={LNCS} }'
  chicago: Richa, Andrea W., and Christian Scheideler. “Self-Stabilizing DeBruijn
    Networks.” In <i>Proceedings of the 13th International Symposium on Stabilization,
    Safety, and Security of Distributed Systems (SSS)</i>, 416–30. LNCS, 2011. <a
    href="https://doi.org/10.1007/978-3-642-24550-3_31">https://doi.org/10.1007/978-3-642-24550-3_31</a>.
  ieee: A. W. Richa and C. Scheideler, “Self-Stabilizing DeBruijn Networks,” in <i>Proceedings
    of the 13th International Symposium on Stabilization, Safety, and Security of
    Distributed Systems (SSS)</i>, 2011, pp. 416–430.
  mla: Richa, Andrea W., and Christian Scheideler. “Self-Stabilizing DeBruijn Networks.”
    <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and
    Security of Distributed Systems (SSS)</i>, 2011, pp. 416–30, doi:<a href="https://doi.org/10.1007/978-3-642-24550-3_31">10.1007/978-3-642-24550-3_31</a>.
  short: 'A.W. Richa, C. Scheideler, in: Proceedings of the 13th International Symposium
    on Stabilization, Safety, and Security of Distributed Systems (SSS), 2011, pp.
    416–430.'
date_created: 2017-10-17T12:42:58Z
date_updated: 2022-01-06T07:03:06Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1007/978-3-642-24550-3_31
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-14T13:57:26Z
  date_updated: 2018-03-14T13:57:26Z
  file_id: '1227'
  file_name: 646-SSS2011-Scheideler_02.pdf
  file_size: 339664
  relation: main_file
  success: 1
file_date_updated: 2018-03-14T13:57:26Z
has_accepted_license: '1'
page: 416-430
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 13th International Symposium on Stabilization, Safety,
  and Security of Distributed Systems (SSS)
series_title: LNCS
status: public
title: Self-Stabilizing DeBruijn Networks
type: conference
user_id: '15504'
year: '2011'
...
---
_id: '659'
author:
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: Liske G. <i>Fault Attacks in Pairing-Based Cryptography</i>. Universität Paderborn;
    2011.
  apa: Liske, G. (2011). <i>Fault attacks in pairing-based cryptography</i>. Universität
    Paderborn.
  bibtex: '@book{Liske_2011, title={Fault attacks in pairing-based cryptography},
    publisher={Universität Paderborn}, author={Liske, Gennadij}, year={2011} }'
  chicago: Liske, Gennadij. <i>Fault Attacks in Pairing-Based Cryptography</i>. Universität
    Paderborn, 2011.
  ieee: G. Liske, <i>Fault attacks in pairing-based cryptography</i>. Universität
    Paderborn, 2011.
  mla: Liske, Gennadij. <i>Fault Attacks in Pairing-Based Cryptography</i>. Universität
    Paderborn, 2011.
  short: G. Liske, Fault Attacks in Pairing-Based Cryptography, Universität Paderborn,
    2011.
date_created: 2017-10-17T12:43:00Z
date_updated: 2022-01-06T07:03:13Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-14T13:47:44Z
  date_updated: 2018-03-14T13:47:44Z
  file_id: '1218'
  file_name: 659-MA_Fault_attacks_in_pairing-based_cryptography_01.pdf
  file_size: 1795920
  relation: main_file
  success: 1
file_date_updated: 2018-03-14T13:47:44Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Fault attacks in pairing-based cryptography
type: mastersthesis
user_id: '25078'
year: '2011'
...
