---
_id: '299'
author:
- first_name: Britta
  full_name: Gerken, Britta
  last_name: Gerken
citation:
  ama: Gerken B. <i>Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie</i>.
    Universität Paderborn; 2015.
  apa: Gerken, B. (2015). <i>Elektromagnetische Seitenkanalangriffe auf paarungsbasierte
    Kryptographie</i>. Universität Paderborn.
  bibtex: '@book{Gerken_2015, title={Elektromagnetische Seitenkanalangriffe auf paarungsbasierte
    Kryptographie}, publisher={Universität Paderborn}, author={Gerken, Britta}, year={2015}
    }'
  chicago: Gerken, Britta. <i>Elektromagnetische Seitenkanalangriffe auf paarungsbasierte
    Kryptographie</i>. Universität Paderborn, 2015.
  ieee: B. Gerken, <i>Elektromagnetische Seitenkanalangriffe auf paarungsbasierte
    Kryptographie</i>. Universität Paderborn, 2015.
  mla: Gerken, Britta. <i>Elektromagnetische Seitenkanalangriffe auf paarungsbasierte
    Kryptographie</i>. Universität Paderborn, 2015.
  short: B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:50Z
date_updated: 2022-01-06T06:58:50Z
department:
- _id: '64'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie
type: mastersthesis
user_id: '477'
year: '2015'
...
---
_id: '301'
author:
- first_name: Jan
  full_name: Bobolz, Jan
  id: '27207'
  last_name: Bobolz
citation:
  ama: Bobolz J. <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn; 2015.
  apa: Bobolz, J. (2015). <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn.
  bibtex: '@book{Bobolz_2015, title={Efficient Verifier-Local Revocation for Anonymous
    Credentials}, publisher={Universität Paderborn}, author={Bobolz, Jan}, year={2015}
    }'
  chicago: Bobolz, Jan. <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  ieee: J. Bobolz, <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  mla: Bobolz, Jan. <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  short: J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:50Z
date_updated: 2022-01-06T06:58:51Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: open_access
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:47:11Z
  date_updated: 2018-07-20T09:54:22Z
  file_id: '1443'
  file_name: 301-thesis_jbobolz_final_02.pdf
  file_size: 1214027
  relation: main_file
file_date_updated: 2018-07-20T09:54:22Z
has_accepted_license: '1'
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Efficient Verifier-Local Revocation for Anonymous Credentials
type: mastersthesis
urn: '3016'
user_id: '27207'
year: '2015'
...
---
_id: '302'
author:
- first_name: Christian
  full_name: Stroh, Christian
  last_name: Stroh
citation:
  ama: Stroh C. <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn; 2015.
  apa: Stroh, C. (2015). <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn.
  bibtex: '@book{Stroh_2015, title={Efficient Attributes for Pairing-Based Anonymous
    Credentials}, publisher={Universität Paderborn}, author={Stroh, Christian}, year={2015}
    }'
  chicago: Stroh, Christian. <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  ieee: C. Stroh, <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  mla: Stroh, Christian. <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  short: C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität
    Paderborn, 2015.
date_created: 2017-10-17T12:41:50Z
date_updated: 2022-01-06T06:58:51Z
department:
- _id: '64'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Efficient Attributes for Pairing-Based Anonymous Credentials
type: mastersthesis
user_id: '477'
year: '2015'
...
---
_id: '304'
author:
- first_name: Andreas
  full_name: Koutsopoulos, Andreas
  last_name: Koutsopoulos
citation:
  ama: Koutsopoulos A. <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn; 2015.
  apa: Koutsopoulos, A. (2015). <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn.
  bibtex: '@book{Koutsopoulos_2015, title={Dynamics and Efficiency in Topological
    Self-Stabilization}, publisher={Universität Paderborn}, author={Koutsopoulos,
    Andreas}, year={2015} }'
  chicago: Koutsopoulos, Andreas. <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn, 2015.
  ieee: A. Koutsopoulos, <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn, 2015.
  mla: Koutsopoulos, Andreas. <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn, 2015.
  short: A. Koutsopoulos, Dynamics and Efficiency in Topological Self-Stabilization,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:51Z
date_updated: 2022-01-06T06:58:53Z
ddc:
- '040'
department:
- _id: '79'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:46:19Z
  date_updated: 2018-03-20T07:46:19Z
  file_id: '1441'
  file_name: 304-Dissertation_-_Koutsopoulos.pdf
  file_size: 2275834
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:46:19Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subproject A1
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: Dynamics and Efficiency in Topological Self-Stabilization
type: dissertation
user_id: '15504'
year: '2015'
...
---
_id: '305'
author:
- first_name: Sebastian
  full_name: Kniesburges, Sebastian
  last_name: Kniesburges
citation:
  ama: Kniesburges S. <i>Distributed Data Structures and the Power of Topological
    Self-Stabilization</i>. Universität Paderborn; 2015.
  apa: Kniesburges, S. (2015). <i>Distributed Data Structures and the Power of topological
    Self-Stabilization</i>. Universität Paderborn.
  bibtex: '@book{Kniesburges_2015, title={Distributed Data Structures and the Power
    of topological Self-Stabilization}, publisher={Universität Paderborn}, author={Kniesburges,
    Sebastian}, year={2015} }'
  chicago: Kniesburges, Sebastian. <i>Distributed Data Structures and the Power of
    Topological Self-Stabilization</i>. Universität Paderborn, 2015.
  ieee: S. Kniesburges, <i>Distributed Data Structures and the Power of topological
    Self-Stabilization</i>. Universität Paderborn, 2015.
  mla: Kniesburges, Sebastian. <i>Distributed Data Structures and the Power of Topological
    Self-Stabilization</i>. Universität Paderborn, 2015.
  short: S. Kniesburges, Distributed Data Structures and the Power of Topological
    Self-Stabilization, Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:51Z
date_updated: 2022-01-06T06:58:54Z
ddc:
- '040'
department:
- _id: '79'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-13T09:14:43Z
  date_updated: 2018-03-13T09:14:43Z
  file_id: '1206'
  file_name: 305-Dissertation_-_Kniesburges.pdf
  file_size: 1709094
  relation: main_file
  success: 1
file_date_updated: 2018-03-13T09:14:43Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '5'
  name: SFB 901 - Subproject A1
- _id: '13'
  name: SFB 901 - Subproject C1
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: Distributed Data Structures and the Power of topological Self-Stabilization
type: dissertation
user_id: '15504'
year: '2015'
...
---
_id: '312'
author:
- first_name: Patrick
  full_name: Schleiter, Patrick
  last_name: Schleiter
citation:
  ama: Schleiter P. <i>Constructions of Fully Secure Predicate Encryption Schemes</i>.
    Universität Paderborn; 2015.
  apa: Schleiter, P. (2015). <i>Constructions of Fully Secure Predicate Encryption
    Schemes</i>. Universität Paderborn.
  bibtex: '@book{Schleiter_2015, title={Constructions of Fully Secure Predicate Encryption
    Schemes}, publisher={Universität Paderborn}, author={Schleiter, Patrick}, year={2015}
    }'
  chicago: Schleiter, Patrick. <i>Constructions of Fully Secure Predicate Encryption
    Schemes</i>. Universität Paderborn, 2015.
  ieee: P. Schleiter, <i>Constructions of Fully Secure Predicate Encryption Schemes</i>.
    Universität Paderborn, 2015.
  mla: Schleiter, Patrick. <i>Constructions of Fully Secure Predicate Encryption Schemes</i>.
    Universität Paderborn, 2015.
  short: P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:52Z
date_updated: 2022-01-06T06:58:57Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:44:55Z
  date_updated: 2018-03-20T07:44:55Z
  file_id: '1439'
  file_name: 312-MA_2015_Schleiter_Constructions_of_fully_secure_PE_schemes_01.pdf
  file_size: 721996
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:44:55Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Constructions of Fully Secure Predicate Encryption Schemes
type: mastersthesis
user_id: '477'
year: '2015'
...
---
_id: '3120'
author:
- first_name: Florian
  full_name: Böhl, Florian
  last_name: Böhl
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jessica
  full_name: Koch, Jessica
  last_name: Koch
- first_name: Christoph
  full_name: Striecks, Christoph
  last_name: Striecks
citation:
  ama: 'Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures
    From Standard Assumptions. <i>J Cryptology</i>. 2015;(1):176--208. doi:<a href="https://doi.org/10.1007/s00145-014-9183-z">10.1007/s00145-014-9183-z</a>'
  apa: 'Böhl, F., Hofheinz, D., Jager, T., Koch, J., &#38; Striecks, C. (2015). Confined
    Guessing: New Signatures From Standard Assumptions. <i>J. Cryptology</i>, (1),
    176--208. <a href="https://doi.org/10.1007/s00145-014-9183-z">https://doi.org/10.1007/s00145-014-9183-z</a>'
  bibtex: '@article{Böhl_Hofheinz_Jager_Koch_Striecks_2015, title={Confined Guessing:
    New Signatures From Standard Assumptions}, DOI={<a href="https://doi.org/10.1007/s00145-014-9183-z">10.1007/s00145-014-9183-z</a>},
    number={1}, journal={J. Cryptology}, author={Böhl, Florian and Hofheinz, Dennis
    and Jager, Tibor and Koch, Jessica and Striecks, Christoph}, year={2015}, pages={176--208}
    }'
  chicago: 'Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph
    Striecks. “Confined Guessing: New Signatures From Standard Assumptions.” <i>J.
    Cryptology</i>, no. 1 (2015): 176--208. <a href="https://doi.org/10.1007/s00145-014-9183-z">https://doi.org/10.1007/s00145-014-9183-z</a>.'
  ieee: 'F. Böhl, D. Hofheinz, T. Jager, J. Koch, and C. Striecks, “Confined Guessing:
    New Signatures From Standard Assumptions,” <i>J. Cryptology</i>, no. 1, pp. 176--208,
    2015.'
  mla: 'Böhl, Florian, et al. “Confined Guessing: New Signatures From Standard Assumptions.”
    <i>J. Cryptology</i>, no. 1, 2015, pp. 176--208, doi:<a href="https://doi.org/10.1007/s00145-014-9183-z">10.1007/s00145-014-9183-z</a>.'
  short: F. Böhl, D. Hofheinz, T. Jager, J. Koch, C. Striecks, J. Cryptology (2015)
    176--208.
date_created: 2018-06-07T09:17:17Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/s00145-014-9183-z
extern: '1'
issue: '1'
page: 176--208
publication: J. Cryptology
status: public
title: 'Confined Guessing: New Signatures From Standard Assumptions'
type: journal_article
user_id: '38235'
year: '2015'
...
---
_id: '3121'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against
    Weaknesses in PKCS#1 v1.5 Encryption. In: <i>Proceedings of the 22nd ACM SIGSAC
    Conference on Computer and Communications Security, Denver, CO, USA, October 12-16,
    2015</i>. ; 2015:1185--1196. doi:<a href="https://doi.org/10.1145/2810103.2813657">10.1145/2810103.2813657</a>'
  apa: Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). On the Security of TLS
    1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In <i>Proceedings of
    the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver,
    CO, USA, October 12-16, 2015</i> (pp. 1185--1196). <a href="https://doi.org/10.1145/2810103.2813657">https://doi.org/10.1145/2810103.2813657</a>
  bibtex: '@inproceedings{Jager_Schwenk_Somorovsky_2015, title={On the Security of
    TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}, DOI={<a href="https://doi.org/10.1145/2810103.2813657">10.1145/2810103.2813657</a>},
    booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
    Security, Denver, CO, USA, October 12-16, 2015}, author={Jager, Tibor and Schwenk,
    Jörg and Somorovsky, Juraj}, year={2015}, pages={1185--1196} }'
  chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “On the Security of TLS
    1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” In <i>Proceedings
    of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver,
    CO, USA, October 12-16, 2015</i>, 1185--1196, 2015. <a href="https://doi.org/10.1145/2810103.2813657">https://doi.org/10.1145/2810103.2813657</a>.
  ieee: T. Jager, J. Schwenk, and J. Somorovsky, “On the Security of TLS 1.3 and QUIC
    Against Weaknesses in PKCS#1 v1.5 Encryption,” in <i>Proceedings of the 22nd ACM
    SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October
    12-16, 2015</i>, 2015, pp. 1185--1196.
  mla: Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses
    in PKCS#1 v1.5 Encryption.” <i>Proceedings of the 22nd ACM SIGSAC Conference on
    Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>,
    2015, pp. 1185--1196, doi:<a href="https://doi.org/10.1145/2810103.2813657">10.1145/2810103.2813657</a>.
  short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC
    Conference on Computer and Communications Security, Denver, CO, USA, October 12-16,
    2015, 2015, pp. 1185--1196.'
date_created: 2018-06-07T09:17:47Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1145/2810103.2813657
extern: '1'
page: 1185--1196
publication: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
  Security, Denver, CO, USA, October 12-16, 2015
status: public
title: On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3122'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH.
    In: <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research
    in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
    I</i>. ; 2015:407--425. doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>'
  apa: Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve
    Attacks on TLS-ECDH. In <i>Computer Security - ESORICS 2015 - 20th European Symposium
    on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
    Part I</i> (pp. 407--425). <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>
  bibtex: '@inproceedings{Jager_Schwenk_Somorovsky_2015, title={Practical Invalid
    Curve Attacks on TLS-ECDH}, DOI={<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>},
    booktitle={Computer Security - ESORICS 2015 - 20th European Symposium on Research
    in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
    I}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015},
    pages={407--425} }'
  chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve
    Attacks on TLS-ECDH.” In <i>Computer Security - ESORICS 2015 - 20th European Symposium
    on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
    Part I</i>, 407--425, 2015. <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>.
  ieee: T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks
    on TLS-ECDH,” in <i>Computer Security - ESORICS 2015 - 20th European Symposium
    on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
    Part I</i>, 2015, pp. 407--425.
  mla: Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer
    Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security,
    Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>, 2015, pp. 407--425,
    doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>.
  short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015
    - 20th European Symposium on Research in Computer Security, Vienna, Austria, September
    21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.'
date_created: 2018-06-07T09:18:33Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-319-24174-6_21
extern: '1'
page: 407--425
publication: Computer Security - ESORICS 2015 - 20th European Symposium on Research
  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
  I
status: public
title: Practical Invalid Curve Attacks on TLS-ECDH
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3123'
author:
- first_name: Felix
  full_name: Heuer, Felix
  last_name: Heuer
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
citation:
  ama: 'Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of
    Practical Public-Key Encryption Schemes. In: <i>Public-Key Cryptography - PKC
    2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>.
    ; 2015:27--51. doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_2">10.1007/978-3-662-46447-2_2</a>'
  apa: Heuer, F., Jager, T., Kiltz, E., &#38; Schäge, S. (2015). On the Selective
    Opening Security of Practical Public-Key Encryption Schemes. In <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>
    (pp. 27--51). <a href="https://doi.org/10.1007/978-3-662-46447-2_2">https://doi.org/10.1007/978-3-662-46447-2_2</a>
  bibtex: '@inproceedings{Heuer_Jager_Kiltz_Schäge_2015, title={On the Selective Opening
    Security of Practical Public-Key Encryption Schemes}, DOI={<a href="https://doi.org/10.1007/978-3-662-46447-2_2">10.1007/978-3-662-46447-2_2</a>},
    booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings}, author={Heuer, Felix and Jager, Tibor and Kiltz,
    Eike and Schäge, Sven}, year={2015}, pages={27--51} }'
  chicago: Heuer, Felix, Tibor Jager, Eike Kiltz, and Sven Schäge. “On the Selective
    Opening Security of Practical Public-Key Encryption Schemes.” In <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    27--51, 2015. <a href="https://doi.org/10.1007/978-3-662-46447-2_2">https://doi.org/10.1007/978-3-662-46447-2_2</a>.
  ieee: F. Heuer, T. Jager, E. Kiltz, and S. Schäge, “On the Selective Opening Security
    of Practical Public-Key Encryption Schemes,” in <i>Public-Key Cryptography - PKC
    2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    2015, pp. 27--51.
  mla: Heuer, Felix, et al. “On the Selective Opening Security of Practical Public-Key
    Encryption Schemes.” <i>Public-Key Cryptography - PKC 2015 - 18th IACR International
    Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
    USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 27--51, doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_2">10.1007/978-3-662-46447-2_2</a>.
  short: 'F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC
    2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015,
    pp. 27--51.'
date_created: 2018-06-07T09:19:04Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46447-2_2
extern: '1'
page: 27--51
publication: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
  30 - April 1, 2015, Proceedings
status: public
title: On the Selective Opening Security of Practical Public-Key Encryption Schemes
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3124'
author:
- first_name: Florian
  full_name: Bergsma, Florian
  last_name: Bergsma
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security:
    An Efficient and Generic Construction in the Standard Model. In: <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>.
    ; 2015:477--494. doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_21">10.1007/978-3-662-46447-2_21</a>'
  apa: 'Bergsma, F., Jager, T., &#38; Schwenk, J. (2015). One-Round Key Exchange with
    Strong Security: An Efficient and Generic Construction in the Standard Model.
    In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings</i> (pp. 477--494). <a href="https://doi.org/10.1007/978-3-662-46447-2_21">https://doi.org/10.1007/978-3-662-46447-2_21</a>'
  bibtex: '@inproceedings{Bergsma_Jager_Schwenk_2015, title={One-Round Key Exchange
    with Strong Security: An Efficient and Generic Construction in the Standard Model},
    DOI={<a href="https://doi.org/10.1007/978-3-662-46447-2_21">10.1007/978-3-662-46447-2_21</a>},
    booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings}, author={Bergsma, Florian and Jager, Tibor and
    Schwenk, Jörg}, year={2015}, pages={477--494} }'
  chicago: 'Bergsma, Florian, Tibor Jager, and Jörg Schwenk. “One-Round Key Exchange
    with Strong Security: An Efficient and Generic Construction in the Standard Model.”
    In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings</i>, 477--494, 2015. <a href="https://doi.org/10.1007/978-3-662-46447-2_21">https://doi.org/10.1007/978-3-662-46447-2_21</a>.'
  ieee: 'F. Bergsma, T. Jager, and J. Schwenk, “One-Round Key Exchange with Strong
    Security: An Efficient and Generic Construction in the Standard Model,” in <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    2015, pp. 477--494.'
  mla: 'Bergsma, Florian, et al. “One-Round Key Exchange with Strong Security: An
    Efficient and Generic Construction in the Standard Model.” <i>Public-Key Cryptography
    - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    2015, pp. 477--494, doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_21">10.1007/978-3-662-46447-2_21</a>.'
  short: 'F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015
    - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography,
    Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.'
date_created: 2018-06-07T09:19:47Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46447-2_21
extern: '1'
page: 477--494
publication: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
  30 - April 1, 2015, Proceedings
status: public
title: 'One-Round Key Exchange with Strong Security: An Efficient and Generic Construction
  in the Standard Model'
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3125'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: 'Jager T. Verifiable Random Functions from Weaker Assumptions. In: <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i>. ; 2015:121--143. doi:<a href="https://doi.org/10.1007/978-3-662-46497-7_5">10.1007/978-3-662-46497-7_5</a>'
  apa: Jager, T. (2015). Verifiable Random Functions from Weaker Assumptions. In <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i> (pp. 121--143). <a href="https://doi.org/10.1007/978-3-662-46497-7_5">https://doi.org/10.1007/978-3-662-46497-7_5</a>
  bibtex: '@inproceedings{Jager_2015, title={Verifiable Random Functions from Weaker
    Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-662-46497-7_5">10.1007/978-3-662-46497-7_5</a>},
    booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
    2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, author={Jager,
    Tibor}, year={2015}, pages={121--143} }'
  chicago: Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” In
    <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015,
    Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>, 121--143, 2015.
    <a href="https://doi.org/10.1007/978-3-662-46497-7_5">https://doi.org/10.1007/978-3-662-46497-7_5</a>.
  ieee: T. Jager, “Verifiable Random Functions from Weaker Assumptions,” in <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143.
  mla: Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143, doi:<a href="https://doi.org/10.1007/978-3-662-46497-7_5">10.1007/978-3-662-46497-7_5</a>.
  short: 'T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference,
    TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp.
    121--143.'
date_created: 2018-06-07T09:20:19Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46497-7_5
extern: '1'
page: 121--143
publication: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}
status: public
title: Verifiable Random Functions from Weaker Assumptions
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3126'
author:
- first_name: Christoph
  full_name: Bader, Christoph
  last_name: Bader
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Yong
  full_name: Li, Yong
  last_name: Li
citation:
  ama: 'Bader C, Hofheinz D, Jager T, Kiltz E, Li Y. Tightly-Secure Authenticated
    Key Exchange. In: <i>Theory of Cryptography - 12th Theory of Cryptography Conference,
    TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>. ; 2015:629--658.
    doi:<a href="https://doi.org/10.1007/978-3-662-46494-6_26">10.1007/978-3-662-46494-6_26</a>'
  apa: Bader, C., Hofheinz, D., Jager, T., Kiltz, E., &#38; Li, Y. (2015). Tightly-Secure
    Authenticated Key Exchange. In <i>Theory of Cryptography - 12th Theory of Cryptography
    Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>
    (pp. 629--658). <a href="https://doi.org/10.1007/978-3-662-46494-6_26">https://doi.org/10.1007/978-3-662-46494-6_26</a>
  bibtex: '@inproceedings{Bader_Hofheinz_Jager_Kiltz_Li_2015, title={Tightly-Secure
    Authenticated Key Exchange}, DOI={<a href="https://doi.org/10.1007/978-3-662-46494-6_26">10.1007/978-3-662-46494-6_26</a>},
    booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
    2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}, author={Bader,
    Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong},
    year={2015}, pages={629--658} }'
  chicago: Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li.
    “Tightly-Secure Authenticated Key Exchange.” In <i>Theory of Cryptography - 12th
    Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015,
    Proceedings, Part I</i>, 629--658, 2015. <a href="https://doi.org/10.1007/978-3-662-46494-6_26">https://doi.org/10.1007/978-3-662-46494-6_26</a>.
  ieee: C. Bader, D. Hofheinz, T. Jager, E. Kiltz, and Y. Li, “Tightly-Secure Authenticated
    Key Exchange,” in <i>Theory of Cryptography - 12th Theory of Cryptography Conference,
    TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>, 2015, pp.
    629--658.
  mla: Bader, Christoph, et al. “Tightly-Secure Authenticated Key Exchange.” <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part I</i>, 2015, pp. 629--658, doi:<a href="https://doi.org/10.1007/978-3-662-46494-6_26">10.1007/978-3-662-46494-6_26</a>.
  short: 'C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography
    - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25,
    2015, Proceedings, Part I, 2015, pp. 629--658.'
date_created: 2018-06-07T09:20:48Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46494-6_26
extern: '1'
page: 629--658
publication: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
status: public
title: Tightly-Secure Authenticated Key Exchange
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '313'
abstract:
- lang: eng
  text: 'Nowadays, many service providers offer software components in the form of
    Software as a Service. Requesters that want to discover those services in order
    to use or to integrate them, need to find out which service satisfies their requirements
    best. For this purpose, service matching approaches determine how well the specifications
    of provided services satisfy their requirements (including structural, behavioral,
    and non-functional requirements). In this paper, we describe the tool-suite MatchBox
    that allows the integration of existing service matchers and their combination
    as part of flexibly configurable matching processes. Taking requirements and service
    specifications as an input, MatchBox is able to execute such matching processes
    and deliver rich matching results. In contrast to related tools, MatchBox allows
    users to take into account many different kinds of requirements, while it also
    provides the flexibility to control the matching process in many different ways. '
author:
- first_name: Paul
  full_name: Börding, Paul
  last_name: Börding
- first_name: Melanie
  full_name: Bruns, Melanie
  last_name: Bruns
- first_name: Marie Christin
  full_name: Platenius, Marie Christin
  last_name: Platenius
citation:
  ama: 'Börding P, Bruns M, Platenius MC. Comprehensive Service Matching with MatchBox.
    In: <i>10th Joint Meeting of the European Software Engineering Conference and
    the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)</i>.
    ; 2015:974--977. doi:<a href="https://doi.org/10.1145/2786805.2803181">10.1145/2786805.2803181</a>'
  apa: Börding, P., Bruns, M., &#38; Platenius, M. C. (2015). Comprehensive Service
    Matching with MatchBox. In <i>10th Joint Meeting of the European Software Engineering
    Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering
    (ESEC/FSE’15)</i> (pp. 974--977). <a href="https://doi.org/10.1145/2786805.2803181">https://doi.org/10.1145/2786805.2803181</a>
  bibtex: '@inproceedings{Börding_Bruns_Platenius_2015, title={Comprehensive Service
    Matching with MatchBox}, DOI={<a href="https://doi.org/10.1145/2786805.2803181">10.1145/2786805.2803181</a>},
    booktitle={10th Joint Meeting of the European Software Engineering Conference
    and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)},
    author={Börding, Paul and Bruns, Melanie and Platenius, Marie Christin}, year={2015},
    pages={974--977} }'
  chicago: Börding, Paul, Melanie Bruns, and Marie Christin Platenius. “Comprehensive
    Service Matching with MatchBox.” In <i>10th Joint Meeting of the European Software
    Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software
    Engineering (ESEC/FSE’15)</i>, 974--977, 2015. <a href="https://doi.org/10.1145/2786805.2803181">https://doi.org/10.1145/2786805.2803181</a>.
  ieee: P. Börding, M. Bruns, and M. C. Platenius, “Comprehensive Service Matching
    with MatchBox,” in <i>10th Joint Meeting of the European Software Engineering
    Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering
    (ESEC/FSE’15)</i>, 2015, pp. 974--977.
  mla: Börding, Paul, et al. “Comprehensive Service Matching with MatchBox.” <i>10th
    Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT
    Symposium on the Foundations of Software Engineering (ESEC/FSE’15)</i>, 2015,
    pp. 974--977, doi:<a href="https://doi.org/10.1145/2786805.2803181">10.1145/2786805.2803181</a>.
  short: 'P. Börding, M. Bruns, M.C. Platenius, in: 10th Joint Meeting of the European
    Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977.'
date_created: 2017-10-17T12:41:53Z
date_updated: 2022-01-06T06:58:58Z
ddc:
- '040'
department:
- _id: '76'
doi: 10.1145/2786805.2803181
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:44:26Z
  date_updated: 2018-03-20T07:44:26Z
  file_id: '1438'
  file_name: 313-p974-boerding.pdf
  file_size: 875687
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:44:26Z
has_accepted_license: '1'
language:
- iso: eng
page: 974--977
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publication: 10th Joint Meeting of the European Software Engineering Conference and
  the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15)
status: public
title: Comprehensive Service Matching with MatchBox
type: conference
user_id: '477'
year: '2015'
...
---
_id: '316'
author:
- first_name: Jannis
  full_name: Pautz, Jannis
  last_name: Pautz
citation:
  ama: Pautz J. <i>Budget Games with Priced Strategies</i>. Universität Paderborn;
    2015.
  apa: Pautz, J. (2015). <i>Budget Games with priced strategies</i>. Universität Paderborn.
  bibtex: '@book{Pautz_2015, title={Budget Games with priced strategies}, publisher={Universität
    Paderborn}, author={Pautz, Jannis}, year={2015} }'
  chicago: Pautz, Jannis. <i>Budget Games with Priced Strategies</i>. Universität
    Paderborn, 2015.
  ieee: J. Pautz, <i>Budget Games with priced strategies</i>. Universität Paderborn,
    2015.
  mla: Pautz, Jannis. <i>Budget Games with Priced Strategies</i>. Universität Paderborn,
    2015.
  short: J. Pautz, Budget Games with Priced Strategies, Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:53Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '63'
- _id: '541'
project:
- _id: '1'
  name: SFB 901
- _id: '7'
  name: SFB 901 - Subprojekt A3
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Alexander
  full_name: Skopalik, Alexander
  id: '40384'
  last_name: Skopalik
title: Budget Games with priced strategies
type: bachelorsthesis
user_id: '14052'
year: '2015'
...
---
_id: '3162'
author:
- first_name: Steffen
  full_name: Ziegert, Steffen
  last_name: Ziegert
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: Ziegert S, Wehrheim H. Temporal plans for software architecture reconfiguration.
    <i>Computer Science - R &#38; D</i>. 2015;(3-4):303--320. doi:<a href="https://doi.org/10.1007/s00450-014-0259-7">10.1007/s00450-014-0259-7</a>
  apa: Ziegert, S., &#38; Wehrheim, H. (2015). Temporal plans for software architecture
    reconfiguration. <i>Computer Science - R &#38; D</i>, (3–4), 303--320. <a href="https://doi.org/10.1007/s00450-014-0259-7">https://doi.org/10.1007/s00450-014-0259-7</a>
  bibtex: '@article{Ziegert_Wehrheim_2015, title={Temporal plans for software architecture
    reconfiguration}, DOI={<a href="https://doi.org/10.1007/s00450-014-0259-7">10.1007/s00450-014-0259-7</a>},
    number={3–4}, journal={Computer Science - R &#38; D}, author={Ziegert, Steffen
    and Wehrheim, Heike}, year={2015}, pages={303--320} }'
  chicago: 'Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture
    Reconfiguration.” <i>Computer Science - R &#38; D</i>, no. 3–4 (2015): 303--320.
    <a href="https://doi.org/10.1007/s00450-014-0259-7">https://doi.org/10.1007/s00450-014-0259-7</a>.'
  ieee: S. Ziegert and H. Wehrheim, “Temporal plans for software architecture reconfiguration,”
    <i>Computer Science - R &#38; D</i>, no. 3–4, pp. 303--320, 2015.
  mla: Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture
    Reconfiguration.” <i>Computer Science - R &#38; D</i>, no. 3–4, 2015, pp. 303--320,
    doi:<a href="https://doi.org/10.1007/s00450-014-0259-7">10.1007/s00450-014-0259-7</a>.
  short: S. Ziegert, H. Wehrheim, Computer Science - R &#38; D (2015) 303--320.
date_created: 2018-06-13T07:47:56Z
date_updated: 2022-01-06T06:59:01Z
ddc:
- '000'
department:
- _id: '77'
doi: 10.1007/s00450-014-0259-7
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T15:52:13Z
  date_updated: 2018-11-02T15:52:13Z
  file_id: '5315'
  file_name: TemporalPlansForSoftwareArchit.pdf
  file_size: 2136451
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T15:52:13Z
has_accepted_license: '1'
issue: 3-4
language:
- iso: eng
page: 303--320
project:
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '1'
  name: SFB 901
- _id: '11'
  name: SFB 901 - Subproject B3
publication: Computer Science - R & D
status: public
title: Temporal plans for software architecture reconfiguration
type: journal_article
user_id: '477'
year: '2015'
...
---
_id: '3163'
author:
- first_name: Roland
  full_name: Meyer, Roland
  last_name: Meyer
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Meyer R, Wehrheim H. From Program Verification to Time and Space: The Scientific
    Life of Ernst-R{\"{u}}diger Olderog. In: Meyer R, Platzer A, Wehrheim H, eds.
    <i>Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on
    the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>.
    Lecture Notes in Computer Science. ; 2015:3--4. doi:<a href="https://doi.org/10.1007/978-3-319-23506-6_1">10.1007/978-3-319-23506-6_1</a>'
  apa: 'Meyer, R., &#38; Wehrheim, H. (2015). From Program Verification to Time and
    Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog. In R. Meyer, A. Platzer,
    &#38; H. Wehrheim (Eds.), <i>Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger
    Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9,
    2015. Proceedings</i> (pp. 3--4). <a href="https://doi.org/10.1007/978-3-319-23506-6_1">https://doi.org/10.1007/978-3-319-23506-6_1</a>'
  bibtex: '@inproceedings{Meyer_Wehrheim_2015, series={Lecture Notes in Computer Science},
    title={From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger
    Olderog}, DOI={<a href="https://doi.org/10.1007/978-3-319-23506-6_1">10.1007/978-3-319-23506-6_1</a>},
    booktitle={Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog
    on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015.
    Proceedings}, author={Meyer, Roland and Wehrheim, Heike}, editor={Meyer, Roland
    and Platzer, Andr{\’{e}} and Wehrheim, HeikeEditors}, year={2015}, pages={3--4},
    collection={Lecture Notes in Computer Science} }'
  chicago: 'Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time
    and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog.” In <i>Correct
    System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion
    of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>,
    edited by Roland Meyer, Andr{\’{e}} Platzer, and Heike Wehrheim, 3--4. Lecture
    Notes in Computer Science, 2015. <a href="https://doi.org/10.1007/978-3-319-23506-6_1">https://doi.org/10.1007/978-3-319-23506-6_1</a>.'
  ieee: 'R. Meyer and H. Wehrheim, “From Program Verification to Time and Space: The
    Scientific Life of Ernst-R{\"{u}}diger Olderog,” in <i>Correct System Design -
    Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th
    Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, 2015, pp.
    3--4.'
  mla: 'Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and
    Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog.” <i>Correct System
    Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of
    His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>, edited
    by Roland Meyer et al., 2015, pp. 3--4, doi:<a href="https://doi.org/10.1007/978-3-319-23506-6_1">10.1007/978-3-319-23506-6_1</a>.'
  short: 'R. Meyer, H. Wehrheim, in: R. Meyer, A. Platzer, H. Wehrheim (Eds.), Correct
    System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion
    of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015,
    pp. 3--4.'
date_created: 2018-06-13T07:49:28Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1007/978-3-319-23506-6_1
editor:
- first_name: Roland
  full_name: Meyer, Roland
  last_name: Meyer
- first_name: Andr{\'{e}}
  full_name: Platzer, Andr{\'{e}}
  last_name: Platzer
- first_name: Heike
  full_name: Wehrheim, Heike
  last_name: Wehrheim
page: 3--4
publication: Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog
  on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings
series_title: Lecture Notes in Computer Science
status: public
title: 'From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger
  Olderog'
type: conference
user_id: '29719'
year: '2015'
...
---
_id: '3164'
author:
- first_name: John
  full_name: Derrick, John
  last_name: Derrick
- first_name: Brijesh
  full_name: Dongol, Brijesh
  last_name: Dongol
- first_name: Gerhard
  full_name: Schellhorn, Gerhard
  last_name: Schellhorn
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Derrick J, Dongol B, Schellhorn G, Travkin O, Wehrheim H. Verifying Opacity
    of a Transactional Mutex Lock. In: Bj{\o}rner N, S. de Boer F, eds. <i>{FM} 2015:
    Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015,
    Proceedings</i>. Lecture Notes in Computer Science. ; 2015:161--177. doi:<a href="https://doi.org/10.1007/978-3-319-19249-9_11">10.1007/978-3-319-19249-9_11</a>'
  apa: 'Derrick, J., Dongol, B., Schellhorn, G., Travkin, O., &#38; Wehrheim, H. (2015).
    Verifying Opacity of a Transactional Mutex Lock. In N. Bj{\o}rner &#38; F. S.
    de Boer (Eds.), <i>{FM} 2015: Formal Methods - 20th International Symposium, Oslo,
    Norway, June 24-26, 2015, Proceedings</i> (pp. 161--177). <a href="https://doi.org/10.1007/978-3-319-19249-9_11">https://doi.org/10.1007/978-3-319-19249-9_11</a>'
  bibtex: '@inproceedings{Derrick_Dongol_Schellhorn_Travkin_Wehrheim_2015, series={Lecture
    Notes in Computer Science}, title={Verifying Opacity of a Transactional Mutex
    Lock}, DOI={<a href="https://doi.org/10.1007/978-3-319-19249-9_11">10.1007/978-3-319-19249-9_11</a>},
    booktitle={{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway,
    June 24-26, 2015, Proceedings}, author={Derrick, John and Dongol, Brijesh and
    Schellhorn, Gerhard and Travkin, Oleg and Wehrheim, Heike}, editor={Bj{\o}rner,
    Nikolaj and S. de Boer, FrankEditors}, year={2015}, pages={161--177}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Oleg Travkin, and Heike
    Wehrheim. “Verifying Opacity of a Transactional Mutex Lock.” In <i>{FM} 2015:
    Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015,
    Proceedings</i>, edited by Nikolaj Bj{\o}rner and Frank S. de Boer, 161--177.
    Lecture Notes in Computer Science, 2015. <a href="https://doi.org/10.1007/978-3-319-19249-9_11">https://doi.org/10.1007/978-3-319-19249-9_11</a>.'
  ieee: 'J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, and H. Wehrheim, “Verifying
    Opacity of a Transactional Mutex Lock,” in <i>{FM} 2015: Formal Methods - 20th
    International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings</i>, 2015,
    pp. 161--177.'
  mla: 'Derrick, John, et al. “Verifying Opacity of a Transactional Mutex Lock.” <i>{FM}
    2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26,
    2015, Proceedings</i>, edited by Nikolaj Bj{\o}rner and Frank S. de Boer, 2015,
    pp. 161--177, doi:<a href="https://doi.org/10.1007/978-3-319-19249-9_11">10.1007/978-3-319-19249-9_11</a>.'
  short: 'J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\o}rner,
    F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium,
    Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.'
date_created: 2018-06-13T07:50:43Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1007/978-3-319-19249-9_11
editor:
- first_name: Nikolaj
  full_name: Bj{\o}rner, Nikolaj
  last_name: Bj{\o}rner
- first_name: Frank
  full_name: S. de Boer, Frank
  last_name: S. de Boer
page: 161--177
project:
- _id: '78'
  name: Validation of Software Transactional Memory
publication: '{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway,
  June 24-26, 2015, Proceedings'
series_title: Lecture Notes in Computer Science
status: public
title: Verifying Opacity of a Transactional Mutex Lock
type: conference
user_id: '29719'
year: '2015'
...
---
_id: '3165'
author:
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
- first_name: Oleg
  full_name: Travkin, Oleg
  last_name: Travkin
citation:
  ama: 'Wehrheim H, Travkin O. {TSO} to {SC} via Symbolic Execution. In: Piterman
    N, ed. <i>Hardware and Software: Verification and Testing - 11th International
    Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015,
    Proceedings</i>. Lecture Notes in Computer Science. ; 2015:104--119. doi:<a href="https://doi.org/10.1007/978-3-319-26287-1_7">10.1007/978-3-319-26287-1_7</a>'
  apa: 'Wehrheim, H., &#38; Travkin, O. (2015). {TSO} to {SC} via Symbolic Execution.
    In N. Piterman (Ed.), <i>Hardware and Software: Verification and Testing - 11th
    International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November
    17-19, 2015, Proceedings</i> (pp. 104--119). <a href="https://doi.org/10.1007/978-3-319-26287-1_7">https://doi.org/10.1007/978-3-319-26287-1_7</a>'
  bibtex: '@inproceedings{Wehrheim_Travkin_2015, series={Lecture Notes in Computer
    Science}, title={{TSO} to {SC} via Symbolic Execution}, DOI={<a href="https://doi.org/10.1007/978-3-319-26287-1_7">10.1007/978-3-319-26287-1_7</a>},
    booktitle={Hardware and Software: Verification and Testing - 11th International
    Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015,
    Proceedings}, author={Wehrheim, Heike and Travkin, Oleg}, editor={Piterman, NirEditor},
    year={2015}, pages={104--119}, collection={Lecture Notes in Computer Science}
    }'
  chicago: 'Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.”
    In <i>Hardware and Software: Verification and Testing - 11th International Haifa
    Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>,
    edited by Nir Piterman, 104--119. Lecture Notes in Computer Science, 2015. <a
    href="https://doi.org/10.1007/978-3-319-26287-1_7">https://doi.org/10.1007/978-3-319-26287-1_7</a>.'
  ieee: 'H. Wehrheim and O. Travkin, “{TSO} to {SC} via Symbolic Execution,” in <i>Hardware
    and Software: Verification and Testing - 11th International Haifa Verification
    Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>,
    2015, pp. 104--119.'
  mla: 'Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.”
    <i>Hardware and Software: Verification and Testing - 11th International Haifa
    Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings</i>,
    edited by Nir Piterman, 2015, pp. 104--119, doi:<a href="https://doi.org/10.1007/978-3-319-26287-1_7">10.1007/978-3-319-26287-1_7</a>.'
  short: 'H. Wehrheim, O. Travkin, in: N. Piterman (Ed.), Hardware and Software: Verification
    and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa,
    Israel, November 17-19, 2015, Proceedings, 2015, pp. 104--119.'
date_created: 2018-06-13T07:52:44Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1007/978-3-319-26287-1_7
editor:
- first_name: Nir
  full_name: Piterman, Nir
  last_name: Piterman
page: 104--119
publication: 'Hardware and Software: Verification and Testing - 11th International
  Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015,
  Proceedings'
series_title: Lecture Notes in Computer Science
status: public
title: '{TSO} to {SC} via Symbolic Execution'
type: conference
user_id: '29719'
year: '2015'
...
---
_id: '3166'
citation:
  ama: Meyer R, Platzer A, Wehrheim H, eds. <i>Correct System Design - Symposium in
    Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg,
    Germany, September 8-9, 2015. Proceedings</i>.; 2015. doi:<a href="https://doi.org/10.1007/978-3-319-23506-6">10.1007/978-3-319-23506-6</a>
  apa: Meyer, R., Platzer, A., &#38; Wehrheim, H. (Eds.). (2015). <i>Correct System
    Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of
    His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. <a
    href="https://doi.org/10.1007/978-3-319-23506-6">https://doi.org/10.1007/978-3-319-23506-6</a>
  bibtex: '@book{Meyer_Platzer_Wehrheim_2015, series={Lecture Notes in Computer Science},
    title={Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog
    on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015.
    Proceedings}, DOI={<a href="https://doi.org/10.1007/978-3-319-23506-6">10.1007/978-3-319-23506-6</a>},
    year={2015}, collection={Lecture Notes in Computer Science} }'
  chicago: Meyer, Roland, Andr{\’{e}} Platzer, and Heike Wehrheim, eds. <i>Correct
    System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion
    of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings</i>.
    Lecture Notes in Computer Science, 2015. <a href="https://doi.org/10.1007/978-3-319-23506-6">https://doi.org/10.1007/978-3-319-23506-6</a>.
  ieee: R. Meyer, A. Platzer, and H. Wehrheim, Eds., <i>Correct System Design - Symposium
    in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday,
    Oldenburg, Germany, September 8-9, 2015. Proceedings</i>. 2015.
  mla: Meyer, Roland, et al., editors. <i>Correct System Design - Symposium in Honor
    of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg,
    Germany, September 8-9, 2015. Proceedings</i>. 2015, doi:<a href="https://doi.org/10.1007/978-3-319-23506-6">10.1007/978-3-319-23506-6</a>.
  short: R. Meyer, A. Platzer, H. Wehrheim, eds., Correct System Design - Symposium
    in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday,
    Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015.
date_created: 2018-06-13T07:54:06Z
date_updated: 2022-01-06T06:59:01Z
department:
- _id: '77'
doi: 10.1007/978-3-319-23506-6
editor:
- first_name: Roland
  full_name: Meyer, Roland
  last_name: Meyer
- first_name: Andr{\'{e}}
  full_name: Platzer, Andr{\'{e}}
  last_name: Platzer
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
publication_identifier:
  isbn:
  - 978-3-319-23505-9
series_title: Lecture Notes in Computer Science
status: public
title: Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on
  the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings
type: conference_editor
user_id: '29719'
year: '2015'
...
