[{"status":"public","file":[{"date_created":"2019-01-04T07:46:21Z","creator":"peuster","date_updated":"2019-01-04T07:46:21Z","file_name":"main_for_ris.pdf","file_id":"6484","access_level":"open_access","file_size":541469,"content_type":"application/pdf","relation":"main_file"}],"publication":"IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp","type":"conference","ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2019-01-04T07:46:21Z","_id":"6483","project":[{"grant_number":"761493","name":"5G Development and validation platform for global industry-specific network services and Apps","_id":"28"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"department":[{"_id":"75"}],"user_id":"35343","year":"2018","place":"Verona","citation":{"ama":"Peuster M, Schneider SB, Christ F, Karl H. A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains. In: <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp</i>. Verona: IEEE; 2018.","chicago":"Peuster, Manuel, Stefan Balthasar Schneider, Frederic Christ, and Holger Karl. “A Prototyping Platform to Validate and Verify Network Service Header-Based Service Chains.” In <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp</i>. Verona: IEEE, 2018.","ieee":"M. Peuster, S. B. Schneider, F. Christ, and H. Karl, “A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains,” in <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp</i>, Verona, 2018.","short":"M. Peuster, S.B. Schneider, F. Christ, H. Karl, in: IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp, IEEE, Verona, 2018.","mla":"Peuster, Manuel, et al. “A Prototyping Platform to Validate and Verify Network Service Header-Based Service Chains.” <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp</i>, IEEE, 2018.","bibtex":"@inproceedings{Peuster_Schneider_Christ_Karl_2018, place={Verona}, title={A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains}, booktitle={IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp}, publisher={IEEE}, author={Peuster, Manuel and Schneider, Stefan Balthasar and Christ, Frederic and Karl, Holger}, year={2018} }","apa":"Peuster, M., Schneider, S. B., Christ, F., &#38; Karl, H. (2018). A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains. In <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp</i>. Verona: IEEE."},"has_accepted_license":"1","title":"A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains","conference":{"end_date":"2018-11-29","location":"Verona","name":"IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp","start_date":"2018-11-27"},"date_updated":"2022-01-06T07:03:07Z","publisher":"IEEE","oa":"1","date_created":"2019-01-04T07:47:19Z","author":[{"first_name":"Manuel","id":"13271","full_name":"Peuster, Manuel","last_name":"Peuster"},{"first_name":"Stefan Balthasar","id":"35343","full_name":"Schneider, Stefan Balthasar","orcid":"0000-0001-8210-4011","last_name":"Schneider"},{"first_name":"Frederic","full_name":"Christ, Frederic","last_name":"Christ"},{"first_name":"Holger","last_name":"Karl","full_name":"Karl, Holger","id":"126"}]},{"citation":{"short":"J. Juhnke, Models and Constructions for Secure Reputation Systems, Universität Paderborn, 2018.","bibtex":"@book{Juhnke_2018, title={Models and Constructions for Secure Reputation Systems}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-570\">10.17619/UNIPB/1-570</a>}, publisher={Universität Paderborn}, author={Juhnke, Jakob}, year={2018} }","mla":"Juhnke, Jakob. <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn, 2018, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-570\">10.17619/UNIPB/1-570</a>.","apa":"Juhnke, J. (2018). <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-570\">https://doi.org/10.17619/UNIPB/1-570</a>","ama":"Juhnke J. <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn; 2018. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-570\">10.17619/UNIPB/1-570</a>","chicago":"Juhnke, Jakob. <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn, 2018. <a href=\"https://doi.org/10.17619/UNIPB/1-570\">https://doi.org/10.17619/UNIPB/1-570</a>.","ieee":"J. Juhnke, <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn, 2018."},"year":"2018","doi":"10.17619/UNIPB/1-570","title":"Models and Constructions for Secure Reputation Systems","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_created":"2019-01-10T07:51:07Z","author":[{"first_name":"Jakob","full_name":"Juhnke, Jakob","id":"48090","last_name":"Juhnke"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:03:13Z","status":"public","type":"dissertation","language":[{"iso":"eng"}],"user_id":"477","department":[{"_id":"64"}],"project":[{"_id":"13","name":"SFB 901 - Subproject C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901","_id":"1"}],"_id":"6597"},{"abstract":[{"lang":"eng","text":"Dynamic allocation of resources is a key feature in network function virtualization (NFV), enabling flexible adjustment of slices and contained network services to ever-changing service demands. \r\nConsidering resource allocation across the entire network, many authors have proposed approaches to optimize the placement and chaining of virtual network function (VNF) instances and the allocation of resources to these VNF instances. In doing so, various optimization objectives are conceivable, e.g., minimizing certain required resources or the end-to-end delay of the placed services.\r\n\r\nIn this paper, we investigate the relationship between four typical optimization objectives when coordinating the placement and resource allocation of chained VNF instances. We observe an interesting trade-off between minimizing the overhead of starting/stopping VNF instances and all other objectives when adapting to changed service demands."}],"status":"public","file":[{"access_level":"open_access","file_name":"preprint_ris.pdf","file_id":"6971","file_size":422196,"creator":"stschn","date_created":"2019-01-24T13:53:16Z","date_updated":"2019-01-24T13:53:16Z","relation":"main_file","content_type":"application/pdf"}],"publication":"IEEE Global Communications Conference (GLOBECOM 2018)","type":"conference","ddc":["040"],"file_date_updated":"2019-01-24T13:53:16Z","language":[{"iso":"eng"}],"_id":"6970","project":[{"name":"5G Development and validation platform for global industry-specific network services and Apps","_id":"28","grant_number":"761493"},{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"department":[{"_id":"75"}],"user_id":"35343","year":"2018","citation":{"ama":"Schneider SB, Dräxler S, Karl H. Trade-offs in Dynamic Resource Allocation in Network Function Virtualization. In: <i>IEEE Global Communications Conference (GLOBECOM 2018)</i>. IEEE; 2018.","chicago":"Schneider, Stefan Balthasar, Sevil Dräxler, and Holger Karl. “Trade-Offs in Dynamic Resource Allocation in Network Function Virtualization.” In <i>IEEE Global Communications Conference (GLOBECOM 2018)</i>. IEEE, 2018.","ieee":"S. B. Schneider, S. Dräxler, and H. Karl, “Trade-offs in Dynamic Resource Allocation in Network Function Virtualization,” in <i>IEEE Global Communications Conference (GLOBECOM 2018)</i>, Abu Dhabi, UAE, 2018.","apa":"Schneider, S. B., Dräxler, S., &#38; Karl, H. (2018). Trade-offs in Dynamic Resource Allocation in Network Function Virtualization. In <i>IEEE Global Communications Conference (GLOBECOM 2018)</i>. Abu Dhabi, UAE: IEEE.","short":"S.B. Schneider, S. Dräxler, H. Karl, in: IEEE Global Communications Conference (GLOBECOM 2018), IEEE, 2018.","bibtex":"@inproceedings{Schneider_Dräxler_Karl_2018, title={Trade-offs in Dynamic Resource Allocation in Network Function Virtualization}, booktitle={IEEE Global Communications Conference (GLOBECOM 2018)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Dräxler, Sevil and Karl, Holger}, year={2018} }","mla":"Schneider, Stefan Balthasar, et al. “Trade-Offs in Dynamic Resource Allocation in Network Function Virtualization.” <i>IEEE Global Communications Conference (GLOBECOM 2018)</i>, IEEE, 2018."},"has_accepted_license":"1","title":"Trade-offs in Dynamic Resource Allocation in Network Function Virtualization","conference":{"location":"Abu Dhabi, UAE","name":"IEEE Global Communications Conference (GLOBECOM 2018)"},"publisher":"IEEE","date_updated":"2022-01-06T07:03:24Z","oa":"1","date_created":"2019-01-24T13:53:22Z","author":[{"first_name":"Stefan Balthasar","full_name":"Schneider, Stefan Balthasar","id":"35343","last_name":"Schneider","orcid":"0000-0001-8210-4011"},{"last_name":"Dräxler","id":"31764","full_name":"Dräxler, Sevil","first_name":"Sevil"},{"last_name":"Karl","id":"126","full_name":"Karl, Holger","first_name":"Holger"}]},{"status":"public","type":"conference","file_date_updated":"2019-01-24T14:25:23Z","_id":"6972","project":[{"grant_number":"761493","_id":"28","name":"5G Development and validation platform for global industry-specific network services and Apps"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"department":[{"_id":"75"}],"user_id":"35343","citation":{"ieee":"S. B. Schneider, M. Peuster, and H. Karl, “A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms,” in <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>, Verona, Italy, 2018.","chicago":"Schneider, Stefan Balthasar, Manuel Peuster, and Holger Karl. “A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms.” In <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>. IEEE, 2018. <a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725795\">https://doi.org/10.1109/NFV-SDN.2018.8725795</a>.","ama":"Schneider SB, Peuster M, Karl H. A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms. In: <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>. IEEE; 2018. doi:<a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725795\">10.1109/NFV-SDN.2018.8725795</a>","apa":"Schneider, S. B., Peuster, M., &#38; Karl, H. (2018). A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms. In <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>. Verona, Italy: IEEE. <a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725795\">https://doi.org/10.1109/NFV-SDN.2018.8725795</a>","short":"S.B. Schneider, M. Peuster, H. Karl, in: IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), IEEE, 2018.","bibtex":"@inproceedings{Schneider_Peuster_Karl_2018, title={A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms}, DOI={<a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725795\">10.1109/NFV-SDN.2018.8725795</a>}, booktitle={IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Peuster, Manuel and Karl, Holger}, year={2018} }","mla":"Schneider, Stefan Balthasar, et al. “A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms.” <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>, IEEE, 2018, doi:<a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725795\">10.1109/NFV-SDN.2018.8725795</a>."},"has_accepted_license":"1","doi":"10.1109/NFV-SDN.2018.8725795","conference":{"name":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)","location":"Verona, Italy"},"main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8725795"}],"date_updated":"2022-01-06T07:03:24Z","oa":"1","author":[{"id":"35343","full_name":"Schneider, Stefan Balthasar","orcid":"0000-0001-8210-4011","last_name":"Schneider","first_name":"Stefan Balthasar"},{"first_name":"Manuel","last_name":"Peuster","id":"13271","full_name":"Peuster, Manuel"},{"first_name":"Holger","full_name":"Karl, Holger","id":"126","last_name":"Karl"}],"abstract":[{"text":"In recent years, a variety of different approaches\r\nhave been proposed to tackle the problem of scaling and placing\r\nnetwork services, consisting of interconnected virtual network\r\nfunctions (VNFs). This paper presents a placement abstraction\r\nlayer (PAL) that provides a clear and simple northbound interface\r\nfor using such algorithms while hiding their internal\r\nfunctionality and implementation. Through its southbound interface,\r\nPAL can connect to different back ends that evaluate\r\nthe calculated placements, e.g., using simulations, emulations, or\r\ntestbed approaches. As an example for such evaluation back ends,\r\nwe introduce a novel placement emulation framework (PEF)\r\nthat allows executing calculated placements using real, containerbased\r\nVNFs on real-world network topologies. In a case study,\r\nwe show how PAL and PEF facilitate reusing and evaluating\r\nplacement algorithms as well as validating their underlying\r\nmodels and performance claims.","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","file_id":"6973","access_level":"open_access","file_name":"preprint_ris.pdf","file_size":468396,"creator":"stschn","date_created":"2019-01-24T14:10:08Z","date_updated":"2019-01-24T14:25:23Z"}],"publication":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)","ddc":["040"],"language":[{"iso":"eng"}],"year":"2018","title":"A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms","publisher":"IEEE","date_created":"2019-01-24T14:10:17Z"},{"year":"2018","title":"A Fully Integrated Multi-Platform NFV SDK","date_created":"2019-01-24T14:17:58Z","publisher":"IEEE","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2019-01-24T14:26:23Z","creator":"stschn","date_created":"2019-01-24T14:17:29Z","file_size":475022,"file_name":"Pre-print.pdf","access_level":"open_access","file_id":"6975"}],"abstract":[{"text":"A key challenge of network function virtualization\r\n(NFV) is the complexity of developing and deploying new\r\nnetwork services. Currently, development requires many manual\r\nsteps that are time-consuming and error-prone (e.g., for creating\r\nservice descriptors). Furthermore, existing management and\r\norchestration (MANO) platforms only offer limited support of\r\nstandardized descriptor models or package formats, limiting the\r\nre-usability of network services.\r\n\r\nTo this end, we introduce a fully integrated, open-source\r\nNFV service development kit (SDK) with multi-MANO platform\r\nsupport. Our SDK simplifies many NFV service development\r\nsteps by offering initial generation of descriptors, advanced\r\nproject management, as well as fully automated packaging and\r\nsubmission for on-boarding. To achieve multi-platform support,\r\nwe present a package format that extends ETSI’s VNF package\r\nformat. In this demonstration, we present the end-to-end workflow\r\nto develop an NFV service that is then packaged for multiple\r\nplatforms, i.e., 5GTANGO and OSM.","lang":"eng"}],"publication":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)","language":[{"iso":"eng"}],"ddc":["040"],"citation":{"bibtex":"@inproceedings{Schneider_Peuster_Tavernier_Karl_2018, title={A Fully Integrated Multi-Platform NFV SDK}, DOI={<a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725794\">10.1109/NFV-SDN.2018.8725794</a>}, booktitle={IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Peuster, Manuel and Tavernier, Wouter and Karl, Holger}, year={2018} }","short":"S.B. Schneider, M. Peuster, W. Tavernier, H. Karl, in: IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), IEEE, 2018.","mla":"Schneider, Stefan Balthasar, et al. “A Fully Integrated Multi-Platform NFV SDK.” <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>, IEEE, 2018, doi:<a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725794\">10.1109/NFV-SDN.2018.8725794</a>.","apa":"Schneider, S. B., Peuster, M., Tavernier, W., &#38; Karl, H. (2018). A Fully Integrated Multi-Platform NFV SDK. In <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>. Verona, Italy: IEEE. <a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725794\">https://doi.org/10.1109/NFV-SDN.2018.8725794</a>","chicago":"Schneider, Stefan Balthasar, Manuel Peuster, Wouter Tavernier, and Holger Karl. “A Fully Integrated Multi-Platform NFV SDK.” In <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>. IEEE, 2018. <a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725794\">https://doi.org/10.1109/NFV-SDN.2018.8725794</a>.","ieee":"S. B. Schneider, M. Peuster, W. Tavernier, and H. Karl, “A Fully Integrated Multi-Platform NFV SDK,” in <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>, Verona, Italy, 2018.","ama":"Schneider SB, Peuster M, Tavernier W, Karl H. A Fully Integrated Multi-Platform NFV SDK. In: <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)</i>. IEEE; 2018. doi:<a href=\"https://doi.org/10.1109/NFV-SDN.2018.8725794\">10.1109/NFV-SDN.2018.8725794</a>"},"has_accepted_license":"1","conference":{"location":"Verona, Italy","name":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)"},"doi":"10.1109/NFV-SDN.2018.8725794","main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8725794"}],"author":[{"first_name":"Stefan Balthasar","id":"35343","full_name":"Schneider, Stefan Balthasar","last_name":"Schneider","orcid":"0000-0001-8210-4011"},{"last_name":"Peuster","id":"13271","full_name":"Peuster, Manuel","first_name":"Manuel"},{"first_name":"Wouter","last_name":"Tavernier","full_name":"Tavernier, Wouter"},{"first_name":"Holger","full_name":"Karl, Holger","id":"126","last_name":"Karl"}],"date_updated":"2022-01-06T07:03:25Z","oa":"1","status":"public","type":"conference","file_date_updated":"2019-01-24T14:26:23Z","department":[{"_id":"75"}],"user_id":"35343","_id":"6974","project":[{"name":"5G Development and validation platform for global industry-specific network services and Apps","_id":"28","grant_number":"761493"},{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C4","_id":"16"}]},{"date_created":"2017-12-13T09:24:01Z","author":[{"first_name":"Thomas","last_name":"John","full_name":"John, Thomas","id":"3952"},{"first_name":"Daniel","last_name":"Szopinski","id":"36372","full_name":"Szopinski, Daniel"}],"date_updated":"2022-01-06T06:50:41Z","title":"Towards explaining the popularity of the Business Model Canvas: A dual coding approach","has_accepted_license":"1","citation":{"ama":"John T, Szopinski D. Towards explaining the popularity of the Business Model Canvas: A dual coding approach. In: <i>Proceedings of the Multikonferenz Wirtschaftsinformatik 2018 (MKWI), Lüneburg, Germany</i>. ; 2018.","ieee":"T. John and D. Szopinski, “Towards explaining the popularity of the Business Model Canvas: A dual coding approach,” 2018.","chicago":"John, Thomas, and Daniel Szopinski. “Towards Explaining the Popularity of the Business Model Canvas: A Dual Coding Approach.” In <i>Proceedings of the Multikonferenz Wirtschaftsinformatik 2018 (MKWI), Lüneburg, Germany</i>, 2018.","bibtex":"@inproceedings{John_Szopinski_2018, title={Towards explaining the popularity of the Business Model Canvas: A dual coding approach}, booktitle={Proceedings of the Multikonferenz Wirtschaftsinformatik 2018 (MKWI), Lüneburg, Germany}, author={John, Thomas and Szopinski, Daniel}, year={2018} }","short":"T. John, D. Szopinski, in: Proceedings of the Multikonferenz Wirtschaftsinformatik 2018 (MKWI), Lüneburg, Germany, 2018.","mla":"John, Thomas, and Daniel Szopinski. “Towards Explaining the Popularity of the Business Model Canvas: A Dual Coding Approach.” <i>Proceedings of the Multikonferenz Wirtschaftsinformatik 2018 (MKWI), Lüneburg, Germany</i>, 2018.","apa":"John, T., &#38; Szopinski, D. (2018). Towards explaining the popularity of the Business Model Canvas: A dual coding approach. <i>Proceedings of the Multikonferenz Wirtschaftsinformatik 2018 (MKWI), Lüneburg, Germany</i>."},"year":"2018","department":[{"_id":"276"}],"user_id":"36372","_id":"1046","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"file_date_updated":"2018-11-12T13:19:37Z","language":[{"iso":"eng"}],"ddc":["040"],"publication":"Proceedings of the Multikonferenz Wirtschaftsinformatik 2018 (MKWI), Lüneburg, Germany","type":"conference","status":"public","file":[{"date_updated":"2018-11-12T13:19:37Z","creator":"dsz","date_created":"2018-11-12T13:19:37Z","file_size":334833,"file_id":"5499","file_name":"MKWI2018_Memorierung.pdf","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}]},{"title":"Platform Launch Strategies","publisher":"Springer","date_updated":"2022-01-06T06:50:41Z","author":[{"last_name":"Stummer","full_name":"Stummer, Christian","first_name":"Christian"},{"first_name":"Dennis","last_name":"Kundisch","id":"21117","full_name":"Kundisch, Dennis"},{"last_name":"Decker","full_name":"Decker, Reinhold","first_name":"Reinhold"}],"date_created":"2017-12-13T09:26:38Z","year":"2018","citation":{"apa":"Stummer, C., Kundisch, D., &#38; Decker, R. (2018). Platform Launch Strategies. <i>Business &#38; Information Systems Engineering</i>.","bibtex":"@article{Stummer_Kundisch_Decker_2018, title={Platform Launch Strategies}, journal={Business &#38; Information Systems Engineering}, publisher={Springer}, author={Stummer, Christian and Kundisch, Dennis and Decker, Reinhold}, year={2018} }","short":"C. Stummer, D. Kundisch, R. Decker, Business &#38; Information Systems Engineering (2018).","mla":"Stummer, Christian, et al. “Platform Launch Strategies.” <i>Business &#38; Information Systems Engineering</i>, Springer, 2018.","ieee":"C. Stummer, D. Kundisch, and R. Decker, “Platform Launch Strategies,” <i>Business &#38; Information Systems Engineering</i>, 2018.","chicago":"Stummer, Christian, Dennis Kundisch, and Reinhold Decker. “Platform Launch Strategies.” <i>Business &#38; Information Systems Engineering</i>, 2018.","ama":"Stummer C, Kundisch D, Decker R. Platform Launch Strategies. <i>Business &#38; Information Systems Engineering</i>. 2018."},"has_accepted_license":"1","publication_status":"published","ddc":["040"],"file_date_updated":"2018-11-14T12:54:24Z","language":[{"iso":"eng"}],"_id":"1047","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"department":[{"_id":"276"}],"user_id":"477","status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-14T12:54:24Z","date_created":"2018-11-14T12:54:24Z","creator":"abursig","file_size":808601,"access_level":"closed","file_id":"5610","file_name":"ICIS2018_TechnologyPivots.pdf"}],"publication":"Business & Information Systems Engineering","type":"journal_article"},{"year":"2018","citation":{"bibtex":"@book{Schwabe_2018, title={Data-Centre Traffic Optimisation using Software-Defined Networks}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-287\">10.17619/UNIPB/1-287</a>}, publisher={Universität Paderborn}, author={Schwabe, Arne}, year={2018} }","mla":"Schwabe, Arne. <i>Data-Centre Traffic Optimisation Using Software-Defined Networks</i>. Universität Paderborn, 2018, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-287\">10.17619/UNIPB/1-287</a>.","short":"A. Schwabe, Data-Centre Traffic Optimisation Using Software-Defined Networks, Universität Paderborn, 2018.","apa":"Schwabe, A. (2018). <i>Data-Centre Traffic Optimisation using Software-Defined Networks</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-287\">https://doi.org/10.17619/UNIPB/1-287</a>","ama":"Schwabe A. <i>Data-Centre Traffic Optimisation Using Software-Defined Networks</i>. Universität Paderborn; 2018. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-287\">10.17619/UNIPB/1-287</a>","chicago":"Schwabe, Arne. <i>Data-Centre Traffic Optimisation Using Software-Defined Networks</i>. Universität Paderborn, 2018. <a href=\"https://doi.org/10.17619/UNIPB/1-287\">https://doi.org/10.17619/UNIPB/1-287</a>.","ieee":"A. Schwabe, <i>Data-Centre Traffic Optimisation using Software-Defined Networks</i>. Universität Paderborn, 2018."},"title":"Data-Centre Traffic Optimisation using Software-Defined Networks","doi":"10.17619/UNIPB/1-287","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:51:17Z","date_created":"2018-03-13T10:22:51Z","supervisor":[{"last_name":"Karl","full_name":"Karl, Holger","id":"126","first_name":"Holger"}],"author":[{"last_name":"Schwabe","full_name":"Schwabe, Arne","first_name":"Arne"}],"status":"public","type":"dissertation","language":[{"iso":"eng"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subproject A2","_id":"6"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"16","name":"SFB 901 - Subproject C4"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"1208","user_id":"477","department":[{"_id":"75"}]},{"file":[{"file_size":561187,"access_level":"closed","file_id":"5225","file_name":"Drees2018_Article_PureNashEquilibriaInRestricted.pdf","date_updated":"2018-10-31T16:56:13Z","creator":"feldi","date_created":"2018-10-31T16:56:13Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"In budget games, players compete over resources with finite budgets. For every resource, a player has a specific demand and as a strategy, he chooses a subset of resources. If the total demand on a resource does not exceed its budget, the utility of each player who chose that resource equals his demand. Otherwise, the budget is shared proportionally. In the general case, pure Nash equilibria (NE) do not exist for such games. In this paper, we consider the natural classes of singleton and matroid budget games with additional constraints and show that for each, pure NE can be guaranteed. In addition, we introduce a lexicographical potential function to prove that every matroid budget game has an approximate pure NE which depends on the largest ratio between the different demands of each individual player.","lang":"eng"}],"publication":"Journal of Combinatorial Optimization","language":[{"iso":"eng"}],"ddc":["000"],"year":"2018","title":"Pure Nash equilibria in restricted budget games","date_created":"2018-03-18T11:12:49Z","publisher":"Springer Nature","status":"public","type":"journal_article","file_date_updated":"2018-10-31T16:56:13Z","user_id":"14052","department":[{"_id":"63"},{"_id":"541"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Subproject A3","_id":"7"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"_id":"1369","citation":{"chicago":"Drees, Maximilian, Matthias Feldotto, Sören Riechers, and Alexander Skopalik. “Pure Nash Equilibria in Restricted Budget Games.” <i>Journal of Combinatorial Optimization</i>, 2018. <a href=\"https://doi.org/10.1007/s10878-018-0269-7\">https://doi.org/10.1007/s10878-018-0269-7</a>.","ieee":"M. Drees, M. Feldotto, S. Riechers, and A. Skopalik, “Pure Nash equilibria in restricted budget games,” <i>Journal of Combinatorial Optimization</i>, 2018.","ama":"Drees M, Feldotto M, Riechers S, Skopalik A. Pure Nash equilibria in restricted budget games. <i>Journal of Combinatorial Optimization</i>. 2018. doi:<a href=\"https://doi.org/10.1007/s10878-018-0269-7\">10.1007/s10878-018-0269-7</a>","bibtex":"@article{Drees_Feldotto_Riechers_Skopalik_2018, title={Pure Nash equilibria in restricted budget games}, DOI={<a href=\"https://doi.org/10.1007/s10878-018-0269-7\">10.1007/s10878-018-0269-7</a>}, journal={Journal of Combinatorial Optimization}, publisher={Springer Nature}, author={Drees, Maximilian and Feldotto, Matthias and Riechers, Sören and Skopalik, Alexander}, year={2018} }","short":"M. Drees, M. Feldotto, S. Riechers, A. Skopalik, Journal of Combinatorial Optimization (2018).","mla":"Drees, Maximilian, et al. “Pure Nash Equilibria in Restricted Budget Games.” <i>Journal of Combinatorial Optimization</i>, Springer Nature, 2018, doi:<a href=\"https://doi.org/10.1007/s10878-018-0269-7\">10.1007/s10878-018-0269-7</a>.","apa":"Drees, M., Feldotto, M., Riechers, S., &#38; Skopalik, A. (2018). Pure Nash equilibria in restricted budget games. <i>Journal of Combinatorial Optimization</i>. <a href=\"https://doi.org/10.1007/s10878-018-0269-7\">https://doi.org/10.1007/s10878-018-0269-7</a>"},"publication_status":"epub_ahead","has_accepted_license":"1","publication_identifier":{"issn":["1382-6905","1573-2886"]},"doi":"10.1007/s10878-018-0269-7","author":[{"last_name":"Drees","full_name":"Drees, Maximilian","first_name":"Maximilian"},{"id":"14052","full_name":"Feldotto, Matthias","orcid":"0000-0003-1348-6516","last_name":"Feldotto","first_name":"Matthias"},{"full_name":"Riechers, Sören","last_name":"Riechers","first_name":"Sören"},{"first_name":"Alexander","last_name":"Skopalik","id":"40384","full_name":"Skopalik, Alexander"}],"date_updated":"2022-01-06T06:51:42Z"},{"date_created":"2018-11-12T09:16:54Z","author":[{"full_name":"Hoffmeister, Jiajia","last_name":"Hoffmeister","first_name":"Jiajia"}],"supervisor":[{"first_name":"Dennis","last_name":"Kundisch","id":"21117","full_name":"Kundisch, Dennis"}],"date_updated":"2022-07-14T13:03:01Z","title":"Evaluation von Taxonomien: Ein Literaturüberblick","citation":{"bibtex":"@book{Hoffmeister_2018, place={Universität Paderborn}, title={Evaluation von Taxonomien: Ein Literaturüberblick}, author={Hoffmeister, Jiajia}, year={2018} }","mla":"Hoffmeister, Jiajia. <i>Evaluation von Taxonomien: Ein Literaturüberblick</i>. 2018.","short":"J. Hoffmeister, Evaluation von Taxonomien: Ein Literaturüberblick, Universität Paderborn, 2018.","apa":"Hoffmeister, J. (2018). <i>Evaluation von Taxonomien: Ein Literaturüberblick</i>.","ama":"Hoffmeister J. <i>Evaluation von Taxonomien: Ein Literaturüberblick</i>.; 2018.","chicago":"Hoffmeister, Jiajia. <i>Evaluation von Taxonomien: Ein Literaturüberblick</i>. Universität Paderborn, 2018.","ieee":"J. Hoffmeister, <i>Evaluation von Taxonomien: Ein Literaturüberblick</i>. Universität Paderborn, 2018."},"year":"2018","place":"Universität Paderborn","user_id":"16205","_id":"5470","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"language":[{"iso":"other"}],"type":"bachelorsthesis","status":"public"},{"citation":{"chicago":"Valentin, Andreas. <i>Zweiseitige Märkte und Plattformökonomie in der Information Systems-Forschung - Ein klassifizierender Literaturüberblick</i>. Universität Paderborn, 2018.","ieee":"A. Valentin, <i>Zweiseitige Märkte und Plattformökonomie in der Information Systems-Forschung - Ein klassifizierender Literaturüberblick</i>. Universität Paderborn, 2018.","ama":"Valentin A. <i>Zweiseitige Märkte und Plattformökonomie in der Information Systems-Forschung - Ein klassifizierender Literaturüberblick</i>. Universität Paderborn; 2018.","apa":"Valentin, A. (2018). <i>Zweiseitige Märkte und Plattformökonomie in der Information Systems-Forschung - Ein klassifizierender Literaturüberblick</i>. Universität Paderborn.","mla":"Valentin, Andreas. <i>Zweiseitige Märkte und Plattformökonomie in der Information Systems-Forschung - Ein klassifizierender Literaturüberblick</i>. Universität Paderborn, 2018.","bibtex":"@book{Valentin_2018, title={Zweiseitige Märkte und Plattformökonomie in der Information Systems-Forschung - Ein klassifizierender Literaturüberblick}, publisher={Universität Paderborn}, author={Valentin, Andreas}, year={2018} }","short":"A. Valentin, Zweiseitige Märkte und Plattformökonomie in der Information Systems-Forschung - Ein klassifizierender Literaturüberblick, Universität Paderborn, 2018."},"year":"2018","title":"Zweiseitige Märkte und Plattformökonomie in der Information Systems-Forschung - Ein klassifizierender Literaturüberblick","date_created":"2018-10-16T13:45:46Z","supervisor":[{"first_name":"Dennis","last_name":"Kundisch","id":"21117","full_name":"Kundisch, Dennis"}],"author":[{"first_name":"Andreas","last_name":"Valentin","full_name":"Valentin, Andreas"}],"date_updated":"2022-07-14T13:04:03Z","publisher":"Universität Paderborn","status":"public","type":"bachelorsthesis","language":[{"iso":"ger"}],"user_id":"16205","_id":"4764","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - Subproject C5"}]},{"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"user_id":"16205","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"_id":"4997","citation":{"ama":"Weigang J. <i>Das Konzept Der Kreativität in Der Wirtschaftsinformatik: Ein Literaturüberblick</i>.; 2018.","chicago":"Weigang, Jana. <i>Das Konzept Der Kreativität in Der Wirtschaftsinformatik: Ein Literaturüberblick</i>. Universität Paderborn, 2018.","ieee":"J. Weigang, <i>Das Konzept der Kreativität in der Wirtschaftsinformatik: Ein Literaturüberblick</i>. Universität Paderborn, 2018.","short":"J. Weigang, Das Konzept Der Kreativität in Der Wirtschaftsinformatik: Ein Literaturüberblick, Universität Paderborn, 2018.","bibtex":"@book{Weigang_2018, place={Universität Paderborn}, title={Das Konzept der Kreativität in der Wirtschaftsinformatik: Ein Literaturüberblick}, author={Weigang, Jana}, year={2018} }","mla":"Weigang, Jana. <i>Das Konzept Der Kreativität in Der Wirtschaftsinformatik: Ein Literaturüberblick</i>. 2018.","apa":"Weigang, J. (2018). <i>Das Konzept der Kreativität in der Wirtschaftsinformatik: Ein Literaturüberblick</i>."},"year":"2018","place":"Universität Paderborn","title":"Das Konzept der Kreativität in der Wirtschaftsinformatik: Ein Literaturüberblick","author":[{"full_name":"Weigang, Jana","last_name":"Weigang","first_name":"Jana"}],"date_created":"2018-10-29T13:04:04Z","supervisor":[{"full_name":"Kundisch, Dennis","id":"21117","last_name":"Kundisch","first_name":"Dennis"}],"date_updated":"2022-07-14T13:03:40Z"},{"abstract":[{"lang":"eng","text":"Molecular Dynamic (MD) simulations are computationally intensive and accelerating them using specialized hardware is a topic of investigation in many studies. One of the routines in the critical path of MD simulations is the three-dimensional Fast Fourier Transformation (FFT3d). The potential in accelerating FFT3d using hardware is usually bound by bandwidth and memory. Therefore, designing a high throughput solution for an FPGA that overcomes this problem is challenging.\r\nIn this thesis, the feasibility of offloading FFT3d computations to FPGA implemented using OpenCL is investigated. In order to mask the latency in memory access, an FFT3d that overlaps computation with communication is designed. The implementa- tion of this design is synthesized for the Arria 10 GX 1150 FPGA and evaluated with the FFTW benchmark. Analysis shows a better performance using FPGA over CPU for larger FFT sizes, with the 643 FFT showing a 70% improvement in runtime using FPGAs.\r\nThis FFT3d design is integrated with CP2K to explore the potential in accelerating molecular dynamic simulations. Evaluation of CP2K simulations using FPGA shows a 41% improvement in runtime in FFT3d computations over CPU for larger FFT3d designs."}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"17093","file_name":"masterthesis.pdf","access_level":"closed","file_size":1297585,"date_created":"2020-06-15T11:29:38Z","creator":"arjunr","date_updated":"2020-06-15T11:29:38Z"}],"keyword":["FFT: FPGA","CP2K","OpenCL"],"ddc":["000"],"language":[{"iso":"eng"}],"year":"2018","title":"Accelerating Molecular Dynamic Simulations by Offloading Fast Fourier Transformations to FPGA","publisher":"Universität Paderborn","date_created":"2018-11-07T16:08:32Z","status":"public","type":"mastersthesis","file_date_updated":"2020-06-15T11:29:38Z","_id":"5417","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"14","name":"SFB 901 - Subproject C2"}],"department":[{"_id":"27"},{"_id":"518"}],"user_id":"49171","citation":{"ama":"Ramaswami A. <i>Accelerating Molecular Dynamic Simulations by Offloading Fast Fourier Transformations to FPGA</i>. Universität Paderborn; 2018.","chicago":"Ramaswami, Arjun. <i>Accelerating Molecular Dynamic Simulations by Offloading Fast Fourier Transformations to FPGA</i>. Universität Paderborn, 2018.","ieee":"A. Ramaswami, <i>Accelerating Molecular Dynamic Simulations by Offloading Fast Fourier Transformations to FPGA</i>. Universität Paderborn, 2018.","mla":"Ramaswami, Arjun. <i>Accelerating Molecular Dynamic Simulations by Offloading Fast Fourier Transformations to FPGA</i>. Universität Paderborn, 2018.","bibtex":"@book{Ramaswami_2018, title={Accelerating Molecular Dynamic Simulations by Offloading Fast Fourier Transformations to FPGA}, publisher={Universität Paderborn}, author={Ramaswami, Arjun}, year={2018} }","short":"A. Ramaswami, Accelerating Molecular Dynamic Simulations by Offloading Fast Fourier Transformations to FPGA, Universität Paderborn, 2018.","apa":"Ramaswami, A. (2018). <i>Accelerating Molecular Dynamic Simulations by Offloading Fast Fourier Transformations to FPGA</i>. Universität Paderborn."},"has_accepted_license":"1","main_file_link":[{"open_access":"1"}],"date_updated":"2022-01-12T16:32:23Z","oa":"1","author":[{"first_name":"Arjun","id":"49171","full_name":"Ramaswami, Arjun","orcid":"https://orcid.org/0000-0002-0909-1178","last_name":"Ramaswami"}],"supervisor":[{"first_name":"Christian","last_name":"Plessl","orcid":"0000-0001-5728-9982","id":"16153","full_name":"Plessl, Christian"}]},{"publication_status":"published","has_accepted_license":"1","publication_identifier":{"isbn":["978-3-030-00434-7"]},"citation":{"ama":"Blömer J, Eidens F, Juhnke J. Enhanced Security of Attribute-Based Signatures. In: <i>The International Conference on Cryptology And Network Security (CANS)</i>. Vol 11124. Lecture Notes in Computer Science. Springer; 2018:235-255. doi:<a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>","chicago":"Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Enhanced Security of Attribute-Based Signatures.” In <i>The International Conference on Cryptology And Network Security (CANS)</i>, 11124:235–55. Lecture Notes in Computer Science. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">https://doi.org/10.1007/978-3-030-00434-7_12</a>.","ieee":"J. Blömer, F. Eidens, and J. Juhnke, “Enhanced Security of Attribute-Based Signatures,” in <i>The International Conference on Cryptology And Network Security (CANS)</i>, Naples, Italy, 2018, vol. 11124, pp. 235–255, doi: <a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>.","apa":"Blömer, J., Eidens, F., &#38; Juhnke, J. (2018). Enhanced Security of Attribute-Based Signatures. <i>The International Conference on Cryptology And Network Security (CANS)</i>, <i>11124</i>, 235–255. <a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">https://doi.org/10.1007/978-3-030-00434-7_12</a>","mla":"Blömer, Johannes, et al. “Enhanced Security of Attribute-Based Signatures.” <i>The International Conference on Cryptology And Network Security (CANS)</i>, vol. 11124, Springer, 2018, pp. 235–55, doi:<a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>.","bibtex":"@inproceedings{Blömer_Eidens_Juhnke_2018, series={Lecture Notes in Computer Science}, title={Enhanced Security of Attribute-Based Signatures}, volume={11124}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>}, booktitle={The International Conference on Cryptology And Network Security (CANS)}, publisher={Springer}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={235–255}, collection={Lecture Notes in Computer Science} }","short":"J. Blömer, F. Eidens, J. Juhnke, in: The International Conference on Cryptology And Network Security (CANS), Springer, 2018, pp. 235–255."},"intvolume":"     11124","page":"235-255","author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Fabian","last_name":"Eidens","full_name":"Eidens, Fabian","id":"25078"},{"first_name":"Jakob","full_name":"Juhnke, Jakob","id":"48090","last_name":"Juhnke"}],"volume":11124,"date_updated":"2023-01-10T10:26:13Z","oa":"1","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/874"}],"doi":"10.1007/978-3-030-00434-7_12","conference":{"location":"Naples, Italy","name":"The International Conference on Cryptology And Network Security (CANS)"},"type":"conference","status":"public","user_id":"25078","series_title":"Lecture Notes in Computer Science","department":[{"_id":"64"}],"project":[{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"},{"name":"SFB 901","_id":"1"}],"_id":"3873","file_date_updated":"2018-11-08T10:15:00Z","year":"2018","date_created":"2018-08-10T09:44:09Z","publisher":"Springer","title":"Enhanced Security of Attribute-Based Signatures","publication":"The International Conference on Cryptology And Network Security (CANS)","file":[{"file_id":"5427","file_name":"uc_abs.pdf","access_level":"closed","file_size":574228,"creator":"feidens","date_created":"2018-11-08T10:15:00Z","date_updated":"2018-11-08T10:15:00Z","relation":"main_file","content_type":"application/pdf"}],"language":[{"iso":"eng"}],"ddc":["000"]},{"date_created":"2018-04-17T12:28:25Z","title":"Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures","year":"2018","ddc":["004"],"language":[{"iso":"eng"}],"publication":"ACNS 2018 Applied Cryptography & Network security","abstract":[{"text":"In this paper, we introduce the notion of delegatable attribute-based anonymous credentials (DAAC). Such systems offer fine-grained anonymous access control and they give the credential holder the ability to issue more restricted credentials to other users. In our model, credentials are parameterized with attributes that (1) express what the credential holder himself has been certified and (2) define which attributes he may issue to others. Furthermore, we present a practical construction of DAAC. For this construction, we deviate from the usual approach of embedding a certificate chain in the credential. Instead, we introduce a novel approach for which we identify a new primitive we call dynamically malleable signatures (DMS) as the main ingredient. This primitive may be of independent interest. We also give a first instantiation of DMS with efficient protocols. ","lang":"eng"}],"file":[{"date_created":"2018-11-02T13:41:16Z","creator":"ups","date_updated":"2018-11-02T13:41:16Z","file_id":"5252","file_name":"2018-340.pdf","access_level":"closed","file_size":542171,"content_type":"application/pdf","relation":"main_file","success":1}],"oa":"1","date_updated":"2023-01-10T10:28:43Z","author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Jan","id":"27207","full_name":"Bobolz, Jan","last_name":"Bobolz"}],"main_file_link":[{"url":"https://eprint.iacr.org/2018/340","open_access":"1"}],"conference":{"location":"Leuven, Belgium","name":"The 16th International Conference on Applied Cryptography and Network Security"},"doi":"10.1007/978-3-319-93387-0_12","publication_status":"accepted","has_accepted_license":"1","citation":{"chicago":"Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” In <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>. LNCS, n.d. <a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">https://doi.org/10.1007/978-3-319-93387-0_12</a>.","ieee":"J. Blömer and J. Bobolz, “Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures,” presented at the The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, doi: <a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>.","ama":"Blömer J, Bobolz J. Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. In: <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>. LNCS. doi:<a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>","mla":"Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>, doi:<a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>.","short":"J. Blömer, J. Bobolz, in: ACNS 2018 Applied Cryptography &#38; Network Security, n.d.","bibtex":"@inproceedings{Blömer_Bobolz, series={LNCS}, title={Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>}, booktitle={ACNS 2018 Applied Cryptography &#38; Network security}, author={Blömer, Johannes and Bobolz, Jan}, collection={LNCS} }","apa":"Blömer, J., &#38; Bobolz, J. (n.d.). Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>. The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium. <a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">https://doi.org/10.1007/978-3-319-93387-0_12</a>"},"project":[{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"2379","series_title":"LNCS","user_id":"25078","department":[{"_id":"7"},{"_id":"64"}],"file_date_updated":"2018-11-02T13:41:16Z","type":"conference","status":"public"},{"quality_controlled":"1","year":"2018","publisher":"IEEE","date_created":"2018-03-22T10:48:01Z","title":"OpenCL-based FPGA Design to Accelerate the Nodal Discontinuous Galerkin Method for Unstructured Meshes","publication":"Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM)","abstract":[{"text":"The exploration of FPGAs as accelerators for scientific simulations has so far mostly been focused on small kernels of methods working on regular data structures, for example in the form of stencil computations for finite difference methods. In computational sciences, often more advanced methods are employed that promise better stability, convergence, locality and scaling. Unstructured meshes are shown to be more effective and more accurate, compared to regular grids, in representing computation domains of various shapes. Using unstructured meshes, the discontinuous Galerkin method preserves the ability to perform explicit local update operations for simulations in the time domain. In this work, we investigate FPGAs as target platform for an implementation of the nodal discontinuous Galerkin method to find time-domain solutions of Maxwell's equations in an unstructured mesh. When maximizing data reuse and fitting constant coefficients into suitably partitioned on-chip memory, high computational intensity allows us to implement and feed wide data paths with hundreds of floating point operators. By decoupling off-chip memory accesses from the computations, high memory bandwidth can be sustained, even for the irregular access pattern required by parts of the application. Using the Intel/Altera OpenCL SDK for FPGAs, we present different implementation variants for different polynomial orders of the method. In different phases of the algorithm, either computational or bandwidth limits of the Arria 10 platform are almost reached, thus outperforming a highly multithreaded CPU implementation by around 2x.","lang":"eng"}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T14:45:05Z","date_created":"2018-11-02T14:45:05Z","creator":"ups","file_size":269130,"file_id":"5282","file_name":"08457652.pdf","access_level":"closed"}],"ddc":["000"],"keyword":["tet_topic_hpc"],"language":[{"iso":"eng"}],"has_accepted_license":"1","citation":{"ama":"Kenter T, Mahale G, Alhaddad S, et al. OpenCL-based FPGA Design to Accelerate the Nodal Discontinuous Galerkin Method for Unstructured Meshes. In: <i>Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM)</i>. IEEE; 2018. doi:<a href=\"https://doi.org/10.1109/FCCM.2018.00037\">10.1109/FCCM.2018.00037</a>","ieee":"T. Kenter <i>et al.</i>, “OpenCL-based FPGA Design to Accelerate the Nodal Discontinuous Galerkin Method for Unstructured Meshes,” presented at the Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM), 2018, doi: <a href=\"https://doi.org/10.1109/FCCM.2018.00037\">10.1109/FCCM.2018.00037</a>.","chicago":"Kenter, Tobias, Gopinath Mahale, Samer Alhaddad, Yevgen Grynko, Christian Schmitt, Ayesha Afzal, Frank Hannig, Jens Förstner, and Christian Plessl. “OpenCL-Based FPGA Design to Accelerate the Nodal Discontinuous Galerkin Method for Unstructured Meshes.” In <i>Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM)</i>. IEEE, 2018. <a href=\"https://doi.org/10.1109/FCCM.2018.00037\">https://doi.org/10.1109/FCCM.2018.00037</a>.","apa":"Kenter, T., Mahale, G., Alhaddad, S., Grynko, Y., Schmitt, C., Afzal, A., Hannig, F., Förstner, J., &#38; Plessl, C. (2018). OpenCL-based FPGA Design to Accelerate the Nodal Discontinuous Galerkin Method for Unstructured Meshes. <i>Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM)</i>. Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM). <a href=\"https://doi.org/10.1109/FCCM.2018.00037\">https://doi.org/10.1109/FCCM.2018.00037</a>","bibtex":"@inproceedings{Kenter_Mahale_Alhaddad_Grynko_Schmitt_Afzal_Hannig_Förstner_Plessl_2018, title={OpenCL-based FPGA Design to Accelerate the Nodal Discontinuous Galerkin Method for Unstructured Meshes}, DOI={<a href=\"https://doi.org/10.1109/FCCM.2018.00037\">10.1109/FCCM.2018.00037</a>}, booktitle={Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM)}, publisher={IEEE}, author={Kenter, Tobias and Mahale, Gopinath and Alhaddad, Samer and Grynko, Yevgen and Schmitt, Christian and Afzal, Ayesha and Hannig, Frank and Förstner, Jens and Plessl, Christian}, year={2018} }","short":"T. Kenter, G. Mahale, S. Alhaddad, Y. Grynko, C. Schmitt, A. Afzal, F. Hannig, J. Förstner, C. Plessl, in: Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM), IEEE, 2018.","mla":"Kenter, Tobias, et al. “OpenCL-Based FPGA Design to Accelerate the Nodal Discontinuous Galerkin Method for Unstructured Meshes.” <i>Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM)</i>, IEEE, 2018, doi:<a href=\"https://doi.org/10.1109/FCCM.2018.00037\">10.1109/FCCM.2018.00037</a>."},"date_updated":"2023-09-26T11:47:52Z","author":[{"last_name":"Kenter","id":"3145","full_name":"Kenter, Tobias","first_name":"Tobias"},{"last_name":"Mahale","full_name":"Mahale, Gopinath","first_name":"Gopinath"},{"first_name":"Samer","last_name":"Alhaddad","full_name":"Alhaddad, Samer","id":"42456"},{"last_name":"Grynko","id":"26059","full_name":"Grynko, Yevgen","first_name":"Yevgen"},{"first_name":"Christian","full_name":"Schmitt, Christian","last_name":"Schmitt"},{"first_name":"Ayesha","full_name":"Afzal, Ayesha","last_name":"Afzal"},{"first_name":"Frank","last_name":"Hannig","full_name":"Hannig, Frank"},{"last_name":"Förstner","orcid":"0000-0001-7059-9862","id":"158","full_name":"Förstner, Jens","first_name":"Jens"},{"full_name":"Plessl, Christian","id":"16153","orcid":"0000-0001-5728-9982","last_name":"Plessl","first_name":"Christian"}],"doi":"10.1109/FCCM.2018.00037","conference":{"name":"Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM)"},"type":"conference","status":"public","project":[{"grant_number":"01|H16005A","_id":"33","name":"HighPerMeshes"},{"grant_number":"160364472","_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"grant_number":"160364472","_id":"14","name":"SFB 901 - Subproject C2"}],"_id":"1588","user_id":"15278","department":[{"_id":"27"},{"_id":"518"},{"_id":"61"}],"file_date_updated":"2018-11-02T14:45:05Z"},{"file":[{"access_level":"closed","file_id":"5281","file_name":"p417-riebler.pdf","file_size":447769,"date_created":"2018-11-02T14:43:37Z","creator":"ups","date_updated":"2018-11-02T14:43:37Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"publication":"Proc. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP)","ddc":["000"],"keyword":["htrop"],"language":[{"iso":"eng"}],"year":"2018","quality_controlled":"1","title":"Automated Code Acceleration Targeting Heterogeneous OpenCL Devices","publisher":"ACM","date_created":"2018-03-08T14:45:18Z","status":"public","type":"conference","file_date_updated":"2018-11-02T14:43:37Z","project":[{"grant_number":"160364472","_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"grant_number":"160364472","name":"SFB 901 - Subproject C2","_id":"14"}],"_id":"1204","user_id":"15278","department":[{"_id":"27"},{"_id":"518"}],"citation":{"ama":"Riebler H, Vaz GF, Kenter T, Plessl C. Automated Code Acceleration Targeting Heterogeneous OpenCL Devices. In: <i>Proc. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP)</i>. ACM; 2018. doi:<a href=\"https://doi.org/10.1145/3178487.3178534\">10.1145/3178487.3178534</a>","chicago":"Riebler, Heinrich, Gavin Francis Vaz, Tobias Kenter, and Christian Plessl. “Automated Code Acceleration Targeting Heterogeneous OpenCL Devices.” In <i>Proc. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP)</i>. ACM, 2018. <a href=\"https://doi.org/10.1145/3178487.3178534\">https://doi.org/10.1145/3178487.3178534</a>.","ieee":"H. Riebler, G. F. Vaz, T. Kenter, and C. Plessl, “Automated Code Acceleration Targeting Heterogeneous OpenCL Devices,” 2018, doi: <a href=\"https://doi.org/10.1145/3178487.3178534\">10.1145/3178487.3178534</a>.","bibtex":"@inproceedings{Riebler_Vaz_Kenter_Plessl_2018, title={Automated Code Acceleration Targeting Heterogeneous OpenCL Devices}, DOI={<a href=\"https://doi.org/10.1145/3178487.3178534\">10.1145/3178487.3178534</a>}, booktitle={Proc. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP)}, publisher={ACM}, author={Riebler, Heinrich and Vaz, Gavin Francis and Kenter, Tobias and Plessl, Christian}, year={2018} }","short":"H. Riebler, G.F. Vaz, T. Kenter, C. Plessl, in: Proc. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), ACM, 2018.","mla":"Riebler, Heinrich, et al. “Automated Code Acceleration Targeting Heterogeneous OpenCL Devices.” <i>Proc. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP)</i>, ACM, 2018, doi:<a href=\"https://doi.org/10.1145/3178487.3178534\">10.1145/3178487.3178534</a>.","apa":"Riebler, H., Vaz, G. F., Kenter, T., &#38; Plessl, C. (2018). Automated Code Acceleration Targeting Heterogeneous OpenCL Devices. <i>Proc. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP)</i>. <a href=\"https://doi.org/10.1145/3178487.3178534\">https://doi.org/10.1145/3178487.3178534</a>"},"publication_status":"published","publication_identifier":{"isbn":["9781450349826"]},"has_accepted_license":"1","doi":"10.1145/3178487.3178534","date_updated":"2023-09-26T11:47:23Z","author":[{"last_name":"Riebler","id":"8961","full_name":"Riebler, Heinrich","first_name":"Heinrich"},{"last_name":"Vaz","id":"30332","full_name":"Vaz, Gavin Francis","first_name":"Gavin Francis"},{"first_name":"Tobias","last_name":"Kenter","id":"3145","full_name":"Kenter, Tobias"},{"full_name":"Plessl, Christian","id":"16153","last_name":"Plessl","orcid":"0000-0001-5728-9982","first_name":"Christian"}]},{"type":"bachelorsthesis","status":"public","abstract":[{"text":"The microservice architecture uses independently running microservices as build- ing blocks for applications. These microservices are clearly bounded for each other and expose their functionality through, for instance, RESTful application inter- faces. Particularly the clear boundaries between microservices enable the reuse of microservice throughout different projects. Because of the increasing use of microservices, the composition of multiple microservices in service composition becomes a more important task. A challenging area in developing service compo- sitions is that it involves two distinct layers with few junctions. On the one hand, describes a service composition a business process, which involves multiple com- ponents. On the other hand, involves the implementation of a service composition topics like service discovery and message exchange protocols since the microser- vices involved in a service composition are located within a network environment. In this Bachelor’s Thesis, I describe a descriptions language to abstractly describe the business logic of a service composition. Furthermore, I describe a genera- tion process, which compiles this abstract description to a working microservice realizing the specified service composition. In addition to that, I provide an im- plementation of the generation process, as a proof of concept, and test it within a Kubernetes-based cluster environment.","lang":"eng"}],"department":[{"_id":"75"}],"user_id":"477","_id":"3291","project":[{"name":"SFB 901 - Subproject C4","_id":"16"},{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"}],"language":[{"iso":"eng"}],"citation":{"short":"A. Schürmann, Microservice-Based Execution Environment for Service Compositions, Universität Paderborn, 2017.","bibtex":"@book{Schürmann_2017, title={Microservice-based Execution Environment for Service Compositions}, publisher={Universität Paderborn}, author={Schürmann, Andreas}, year={2017} }","mla":"Schürmann, Andreas. <i>Microservice-Based Execution Environment for Service Compositions</i>. Universität Paderborn, 2017.","apa":"Schürmann, A. (2017). <i>Microservice-based Execution Environment for Service Compositions</i>. Universität Paderborn.","chicago":"Schürmann, Andreas. <i>Microservice-Based Execution Environment for Service Compositions</i>. Universität Paderborn, 2017.","ieee":"A. Schürmann, <i>Microservice-based Execution Environment for Service Compositions</i>. Universität Paderborn, 2017.","ama":"Schürmann A. <i>Microservice-Based Execution Environment for Service Compositions</i>. Universität Paderborn; 2017."},"year":"2017","supervisor":[{"first_name":"Holger","full_name":"Karl, Holger","id":"126","last_name":"Karl"}],"author":[{"last_name":"Schürmann","full_name":"Schürmann, Andreas","first_name":"Andreas"}],"date_created":"2018-06-21T11:09:30Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:59:09Z","title":"Microservice-based Execution Environment for Service Compositions"},{"year":"2017","title":"Subtleties in Security Definitions for Predicate Encryption with Public Index","date_created":"2018-06-04T12:17:48Z","publisher":"Springer International Publishing","file":[{"date_updated":"2018-11-02T14:52:10Z","creator":"ups","date_created":"2018-11-02T14:52:10Z","file_size":463904,"access_level":"closed","file_id":"5286","file_name":"SubtletiesInSecurityDefinition.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"publication":"Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)","language":[{"iso":"eng"}],"ddc":["000"],"citation":{"short":"J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.","bibtex":"@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }","mla":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>.","apa":"Blömer, J., &#38; Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>","chicago":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>.","ieee":"J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2017, vol. 10693, pp. 438–453.","ama":"Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>"},"page":"438-453","intvolume":"     10693","place":"Cham","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319724522","9783319724539"]},"has_accepted_license":"1","main_file_link":[{"url":"https://eprint.iacr.org/2017/453.pdf","open_access":"1"}],"doi":"10.1007/978-3-319-72453-9_35","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"full_name":"Liske, Gennadij","last_name":"Liske","first_name":"Gennadij"}],"volume":10693,"date_updated":"2022-01-06T06:58:49Z","oa":"1","status":"public","type":"conference","file_date_updated":"2018-11-02T14:52:10Z","user_id":"477","series_title":"Lecture Notes in Computer Science","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"2967"},{"_id":"116","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"department":[{"_id":"64"}],"user_id":"25078","type":"dissertation","status":"public","date_updated":"2022-01-06T06:51:04Z","publisher":"Universität Paderborn","author":[{"first_name":"Gennadij","full_name":"Liske, Gennadij","last_name":"Liske"}],"supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2017-10-17T12:41:14Z","title":"CCA-Security for Predicate Encryption Schemes","doi":"10.17619/UNIPB/1-220","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-29690"}],"year":"2017","citation":{"ama":"Liske G. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn; 2017. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-220\">10.17619/UNIPB/1-220</a>","chicago":"Liske, Gennadij. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn, 2017. <a href=\"https://doi.org/10.17619/UNIPB/1-220\">https://doi.org/10.17619/UNIPB/1-220</a>.","ieee":"G. Liske, <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn, 2017.","bibtex":"@book{Liske_2017, title={CCA-Security for Predicate Encryption Schemes}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-220\">10.17619/UNIPB/1-220</a>}, publisher={Universität Paderborn}, author={Liske, Gennadij}, year={2017} }","short":"G. Liske, CCA-Security for Predicate Encryption Schemes, Universität Paderborn, 2017.","mla":"Liske, Gennadij. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn, 2017, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-220\">10.17619/UNIPB/1-220</a>.","apa":"Liske, G. (2017). <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-220\">https://doi.org/10.17619/UNIPB/1-220</a>"}}]
