[{"publication_identifier":{"isbn":["978-3-95977-094-1"]},"publication_status":"published","year":"2018","page":"46:1--46:12","citation":{"ieee":"J. Blömer, S. Brauer, and K. Bujna, “Coresets for Fuzzy K-Means with Applications,” in <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>, Jiaoxi, Yilan County, Taiwan, 2018, pp. 46:1--46:12.","chicago":"Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Coresets for Fuzzy K-Means with Applications.” In <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>, 46:1--46:12. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018. <a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">https://doi.org/10.4230/LIPIcs.ISAAC.2018.46</a>.","ama":"Blömer J, Brauer S, Bujna K. Coresets for Fuzzy K-Means with Applications. In: <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik; 2018:46:1--46:12. doi:<a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">10.4230/LIPIcs.ISAAC.2018.46</a>","apa":"Blömer, J., Brauer, S., &#38; Bujna, K. (2018). Coresets for Fuzzy K-Means with Applications. In <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i> (pp. 46:1--46:12). Jiaoxi, Yilan County, Taiwan: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik. <a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">https://doi.org/10.4230/LIPIcs.ISAAC.2018.46</a>","mla":"Blömer, Johannes, et al. “Coresets for Fuzzy K-Means with Applications.” <i>29th International Symposium on Algorithms and Computation  (ISAAC 2018)</i>, Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018, pp. 46:1--46:12, doi:<a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">10.4230/LIPIcs.ISAAC.2018.46</a>.","bibtex":"@inproceedings{Blömer_Brauer_Bujna_2018, title={Coresets for Fuzzy K-Means with Applications}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.ISAAC.2018.46\">10.4230/LIPIcs.ISAAC.2018.46</a>}, booktitle={29th International Symposium on Algorithms and Computation  (ISAAC 2018)}, publisher={Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}, author={Blömer, Johannes and Brauer, Sascha and Bujna, Kathrin}, year={2018}, pages={46:1--46:12} }","short":"J. Blömer, S. Brauer, K. Bujna, in: 29th International Symposium on Algorithms and Computation  (ISAAC 2018), Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018, pp. 46:1--46:12."},"date_updated":"2022-01-06T07:00:57Z","publisher":"Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik","author":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"},{"full_name":"Brauer, Sascha","id":"13291","last_name":"Brauer","first_name":"Sascha"},{"full_name":"Bujna, Kathrin","last_name":"Bujna","first_name":"Kathrin"}],"date_created":"2018-09-03T08:04:19Z","title":"Coresets for Fuzzy K-Means with Applications","conference":{"location":"Jiaoxi, Yilan County, Taiwan","end_date":"2018-12-19","start_date":"2018-12-17","name":"29th International Symposium on Algorithms and Computation (ISAAC)"},"doi":"10.4230/LIPIcs.ISAAC.2018.46","publication":"29th International Symposium on Algorithms and Computation  (ISAAC 2018)","type":"conference","status":"public","_id":"4344","project":[{"name":"Soft-Clustering - Von Heuristiken zu Approximationsalgorithmen","_id":"45"}],"department":[{"_id":"64"}],"user_id":"13291","language":[{"iso":"eng"}]},{"type":"bachelorsthesis","status":"public","user_id":"13703","department":[{"_id":"64"}],"_id":"5426","language":[{"iso":"ger"}],"extern":"1","citation":{"ama":"von Heißen O. <i>Implementierung und Analyse von Searchable Encryption</i>.; 2018.","ieee":"O. von Heißen, <i>Implementierung und Analyse von Searchable Encryption</i>. 2018.","chicago":"Heißen, Oliver von. <i>Implementierung und Analyse von Searchable Encryption</i>, 2018.","apa":"von Heißen, O. (2018). <i>Implementierung und Analyse von Searchable Encryption</i>.","short":"O. von Heißen, Implementierung und Analyse von Searchable Encryption, 2018.","mla":"von Heißen, Oliver. <i>Implementierung und Analyse von Searchable Encryption</i>. 2018.","bibtex":"@book{von Heißen_2018, title={Implementierung und Analyse von Searchable Encryption}, author={von Heißen, Oliver}, year={2018} }"},"year":"2018","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2018-11-08T10:13:08Z","author":[{"full_name":"von Heißen, Oliver","last_name":"von Heißen","first_name":"Oliver"}],"date_updated":"2022-01-06T07:01:53Z","title":"Implementierung und Analyse von Searchable Encryption"},{"doi":"10.17619/UNIPB/1-570","title":"Models and Constructions for Secure Reputation Systems","author":[{"first_name":"Jakob","last_name":"Juhnke","full_name":"Juhnke, Jakob","id":"48090"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_created":"2019-01-10T07:51:07Z","date_updated":"2022-01-06T07:03:13Z","publisher":"Universität Paderborn","citation":{"chicago":"Juhnke, Jakob. <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn, 2018. <a href=\"https://doi.org/10.17619/UNIPB/1-570\">https://doi.org/10.17619/UNIPB/1-570</a>.","ieee":"J. Juhnke, <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn, 2018.","ama":"Juhnke J. <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn; 2018. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-570\">10.17619/UNIPB/1-570</a>","apa":"Juhnke, J. (2018). <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-570\">https://doi.org/10.17619/UNIPB/1-570</a>","short":"J. Juhnke, Models and Constructions for Secure Reputation Systems, Universität Paderborn, 2018.","bibtex":"@book{Juhnke_2018, title={Models and Constructions for Secure Reputation Systems}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-570\">10.17619/UNIPB/1-570</a>}, publisher={Universität Paderborn}, author={Juhnke, Jakob}, year={2018} }","mla":"Juhnke, Jakob. <i>Models and Constructions for Secure Reputation Systems</i>. Universität Paderborn, 2018, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-570\">10.17619/UNIPB/1-570</a>."},"year":"2018","language":[{"iso":"eng"}],"department":[{"_id":"64"}],"user_id":"477","_id":"6597","project":[{"_id":"13","name":"SFB 901 - Subproject C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901","_id":"1"}],"status":"public","type":"dissertation"},{"file":[{"date_updated":"2018-11-08T10:15:00Z","creator":"feidens","date_created":"2018-11-08T10:15:00Z","file_size":574228,"file_name":"uc_abs.pdf","access_level":"closed","file_id":"5427","content_type":"application/pdf","relation":"main_file"}],"publication":"The International Conference on Cryptology And Network Security (CANS)","language":[{"iso":"eng"}],"ddc":["000"],"year":"2018","title":"Enhanced Security of Attribute-Based Signatures","date_created":"2018-08-10T09:44:09Z","publisher":"Springer","status":"public","type":"conference","file_date_updated":"2018-11-08T10:15:00Z","series_title":"Lecture Notes in Computer Science","user_id":"25078","department":[{"_id":"64"}],"project":[{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"},{"name":"SFB 901","_id":"1"}],"_id":"3873","citation":{"chicago":"Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Enhanced Security of Attribute-Based Signatures.” In <i>The International Conference on Cryptology And Network Security (CANS)</i>, 11124:235–55. Lecture Notes in Computer Science. Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">https://doi.org/10.1007/978-3-030-00434-7_12</a>.","ieee":"J. Blömer, F. Eidens, and J. Juhnke, “Enhanced Security of Attribute-Based Signatures,” in <i>The International Conference on Cryptology And Network Security (CANS)</i>, Naples, Italy, 2018, vol. 11124, pp. 235–255, doi: <a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>.","ama":"Blömer J, Eidens F, Juhnke J. Enhanced Security of Attribute-Based Signatures. In: <i>The International Conference on Cryptology And Network Security (CANS)</i>. Vol 11124. Lecture Notes in Computer Science. Springer; 2018:235-255. doi:<a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>","short":"J. Blömer, F. Eidens, J. Juhnke, in: The International Conference on Cryptology And Network Security (CANS), Springer, 2018, pp. 235–255.","mla":"Blömer, Johannes, et al. “Enhanced Security of Attribute-Based Signatures.” <i>The International Conference on Cryptology And Network Security (CANS)</i>, vol. 11124, Springer, 2018, pp. 235–55, doi:<a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>.","bibtex":"@inproceedings{Blömer_Eidens_Juhnke_2018, series={Lecture Notes in Computer Science}, title={Enhanced Security of Attribute-Based Signatures}, volume={11124}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">10.1007/978-3-030-00434-7_12</a>}, booktitle={The International Conference on Cryptology And Network Security (CANS)}, publisher={Springer}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={235–255}, collection={Lecture Notes in Computer Science} }","apa":"Blömer, J., Eidens, F., &#38; Juhnke, J. (2018). Enhanced Security of Attribute-Based Signatures. <i>The International Conference on Cryptology And Network Security (CANS)</i>, <i>11124</i>, 235–255. <a href=\"https://doi.org/10.1007/978-3-030-00434-7_12\">https://doi.org/10.1007/978-3-030-00434-7_12</a>"},"page":"235-255","intvolume":"     11124","publication_status":"published","publication_identifier":{"isbn":["978-3-030-00434-7"]},"has_accepted_license":"1","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/874"}],"doi":"10.1007/978-3-030-00434-7_12","conference":{"name":"The International Conference on Cryptology And Network Security (CANS)","location":"Naples, Italy"},"author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"id":"25078","full_name":"Eidens, Fabian","last_name":"Eidens","first_name":"Fabian"},{"id":"48090","full_name":"Juhnke, Jakob","last_name":"Juhnke","first_name":"Jakob"}],"volume":11124,"date_updated":"2023-01-10T10:26:13Z","oa":"1"},{"citation":{"short":"J. Blömer, J. Bobolz, in: ACNS 2018 Applied Cryptography &#38; Network Security, n.d.","mla":"Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>, doi:<a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>.","bibtex":"@inproceedings{Blömer_Bobolz, series={LNCS}, title={Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>}, booktitle={ACNS 2018 Applied Cryptography &#38; Network security}, author={Blömer, Johannes and Bobolz, Jan}, collection={LNCS} }","apa":"Blömer, J., &#38; Bobolz, J. (n.d.). Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>. The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium. <a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">https://doi.org/10.1007/978-3-319-93387-0_12</a>","ama":"Blömer J, Bobolz J. Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. In: <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>. LNCS. doi:<a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>","chicago":"Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” In <i>ACNS 2018 Applied Cryptography &#38; Network Security</i>. LNCS, n.d. <a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">https://doi.org/10.1007/978-3-319-93387-0_12</a>.","ieee":"J. Blömer and J. Bobolz, “Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures,” presented at the The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, doi: <a href=\"https://doi.org/10.1007/978-3-319-93387-0_12\">10.1007/978-3-319-93387-0_12</a>."},"has_accepted_license":"1","publication_status":"accepted","conference":{"name":"The 16th International Conference on Applied Cryptography and Network Security","location":"Leuven, Belgium"},"doi":"10.1007/978-3-319-93387-0_12","main_file_link":[{"url":"https://eprint.iacr.org/2018/340","open_access":"1"}],"oa":"1","date_updated":"2023-01-10T10:28:43Z","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"id":"27207","full_name":"Bobolz, Jan","last_name":"Bobolz","first_name":"Jan"}],"status":"public","type":"conference","file_date_updated":"2018-11-02T13:41:16Z","_id":"2379","project":[{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"7"},{"_id":"64"}],"user_id":"25078","series_title":"LNCS","year":"2018","title":"Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures","date_created":"2018-04-17T12:28:25Z","abstract":[{"lang":"eng","text":"In this paper, we introduce the notion of delegatable attribute-based anonymous credentials (DAAC). Such systems offer fine-grained anonymous access control and they give the credential holder the ability to issue more restricted credentials to other users. In our model, credentials are parameterized with attributes that (1) express what the credential holder himself has been certified and (2) define which attributes he may issue to others. Furthermore, we present a practical construction of DAAC. For this construction, we deviate from the usual approach of embedding a certificate chain in the credential. Instead, we introduce a novel approach for which we identify a new primitive we call dynamically malleable signatures (DMS) as the main ingredient. This primitive may be of independent interest. We also give a first instantiation of DMS with efficient protocols. "}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"5252","access_level":"closed","file_name":"2018-340.pdf","file_size":542171,"date_created":"2018-11-02T13:41:16Z","creator":"ups","date_updated":"2018-11-02T13:41:16Z"}],"publication":"ACNS 2018 Applied Cryptography & Network security","ddc":["004"],"language":[{"iso":"eng"}]},{"user_id":"25078","department":[{"_id":"64"}],"_id":"2908","type":"dissertation","status":"public","date_created":"2018-05-25T10:02:30Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"author":[{"last_name":"Bujna","full_name":"Bujna, Kathrin","first_name":"Kathrin"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:46Z","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-29759"}],"doi":"10.17619/UNIPB/1-226","title":"Soft Clustering Algorithms - Theoretical and Practical Improvements","citation":{"ama":"Bujna K. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn; 2017. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-226\">10.17619/UNIPB/1-226</a>","chicago":"Bujna, Kathrin. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn, 2017. <a href=\"https://doi.org/10.17619/UNIPB/1-226\">https://doi.org/10.17619/UNIPB/1-226</a>.","ieee":"K. Bujna, <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn, 2017.","apa":"Bujna, K. (2017). <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-226\">https://doi.org/10.17619/UNIPB/1-226</a>","bibtex":"@book{Bujna_2017, title={Soft Clustering Algorithms - Theoretical and Practical Improvements}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-226\">10.17619/UNIPB/1-226</a>}, publisher={Universität Paderborn}, author={Bujna, Kathrin}, year={2017} }","mla":"Bujna, Kathrin. <i>Soft Clustering Algorithms - Theoretical and Practical Improvements</i>. Universität Paderborn, 2017, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-226\">10.17619/UNIPB/1-226</a>.","short":"K. Bujna, Soft Clustering Algorithms - Theoretical and Practical Improvements, Universität Paderborn, 2017."},"year":"2017"},{"citation":{"short":"J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.","bibtex":"@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }","mla":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>.","apa":"Blömer, J., &#38; Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>","ama":"Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>","chicago":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>.","ieee":"J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2017, vol. 10693, pp. 438–453."},"intvolume":"     10693","page":"438-453","place":"Cham","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319724522","9783319724539"]},"has_accepted_license":"1","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2017/453.pdf"}],"doi":"10.1007/978-3-319-72453-9_35","author":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"},{"first_name":"Gennadij","last_name":"Liske","full_name":"Liske, Gennadij"}],"volume":10693,"date_updated":"2022-01-06T06:58:49Z","oa":"1","status":"public","type":"conference","file_date_updated":"2018-11-02T14:52:10Z","series_title":"Lecture Notes in Computer Science","user_id":"477","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"2967","year":"2017","title":"Subtleties in Security Definitions for Predicate Encryption with Public Index","date_created":"2018-06-04T12:17:48Z","publisher":"Springer International Publishing","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T14:52:10Z","date_created":"2018-11-02T14:52:10Z","creator":"ups","file_size":463904,"file_id":"5286","file_name":"SubtletiesInSecurityDefinition.pdf","access_level":"closed"}],"publication":"Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)","language":[{"iso":"eng"}],"ddc":["000"]},{"author":[{"first_name":"Gennadij","full_name":"Liske, Gennadij","last_name":"Liske"}],"date_created":"2017-10-17T12:41:14Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:51:04Z","doi":"10.17619/UNIPB/1-220","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-29690"}],"title":"CCA-Security for Predicate Encryption Schemes","citation":{"apa":"Liske, G. (2017). <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-220\">https://doi.org/10.17619/UNIPB/1-220</a>","mla":"Liske, Gennadij. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn, 2017, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-220\">10.17619/UNIPB/1-220</a>.","bibtex":"@book{Liske_2017, title={CCA-Security for Predicate Encryption Schemes}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-220\">10.17619/UNIPB/1-220</a>}, publisher={Universität Paderborn}, author={Liske, Gennadij}, year={2017} }","short":"G. Liske, CCA-Security for Predicate Encryption Schemes, Universität Paderborn, 2017.","ama":"Liske G. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn; 2017. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-220\">10.17619/UNIPB/1-220</a>","ieee":"G. Liske, <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn, 2017.","chicago":"Liske, Gennadij. <i>CCA-Security for Predicate Encryption Schemes</i>. Universität Paderborn, 2017. <a href=\"https://doi.org/10.17619/UNIPB/1-220\">https://doi.org/10.17619/UNIPB/1-220</a>."},"year":"2017","department":[{"_id":"64"}],"user_id":"25078","_id":"116","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"type":"dissertation","status":"public"},{"file":[{"file_size":658797,"file_name":"searchable_encryption_access_control_website.pdf","file_id":"5431","access_level":"open_access","date_updated":"2018-11-08T10:56:15Z","creator":"nilo","date_created":"2018-11-08T10:56:15Z","relation":"main_file","content_type":"application/pdf"}],"publication":"Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES '17","ddc":["000"],"language":[{"iso":"eng"}],"year":"2017","title":"Searchable Encryption with Access Control","publisher":"ACM Press","date_created":"2018-04-13T11:40:23Z","status":"public","type":"conference","article_number":"24","file_date_updated":"2018-11-08T10:56:15Z","_id":"2343","project":[{"_id":"43","name":"Securing the Financial Cloud"}],"department":[{"_id":"64"}],"user_id":"13703","series_title":"ICPS","citation":{"ama":"Löken N. Searchable Encryption with Access Control. In: <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>. ICPS. ACM Press; 2017. doi:<a href=\"https://doi.org/10.1145/3098954.3098987\">10.1145/3098954.3098987</a>","chicago":"Löken, Nils. “Searchable Encryption with Access Control.” In <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>. ICPS. ACM Press, 2017. <a href=\"https://doi.org/10.1145/3098954.3098987\">https://doi.org/10.1145/3098954.3098987</a>.","ieee":"N. Löken, “Searchable Encryption with Access Control,” in <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>, 2017.","apa":"Löken, N. (2017). Searchable Encryption with Access Control. In <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>. ACM Press. <a href=\"https://doi.org/10.1145/3098954.3098987\">https://doi.org/10.1145/3098954.3098987</a>","mla":"Löken, Nils. “Searchable Encryption with Access Control.” <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>, 24, ACM Press, 2017, doi:<a href=\"https://doi.org/10.1145/3098954.3098987\">10.1145/3098954.3098987</a>.","short":"N. Löken, in: Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17, ACM Press, 2017.","bibtex":"@inproceedings{Löken_2017, series={ICPS}, title={Searchable Encryption with Access Control}, DOI={<a href=\"https://doi.org/10.1145/3098954.3098987\">10.1145/3098954.3098987</a>}, number={24}, booktitle={Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17}, publisher={ACM Press}, author={Löken, Nils}, year={2017}, collection={ICPS} }"},"publication_identifier":{"isbn":["9781450352574"]},"has_accepted_license":"1","publication_status":"published","doi":"10.1145/3098954.3098987","main_file_link":[{"open_access":"1","url":"http://eprint.iacr.org/2017/679"}],"oa":"1","date_updated":"2022-01-06T06:55:54Z","author":[{"first_name":"Nils","last_name":"Löken","full_name":"Löken, Nils","id":"13703"}]},{"page":"3-17","citation":{"apa":"Blömer, J., Günther, P., Krummel, V., &#38; Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In <i>Foundations and Practice of Security</i> (pp. 3–17). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">https://doi.org/10.1007/978-3-319-75650-9_1</a>","mla":"Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” <i>Foundations and Practice of Security</i>, Springer International Publishing, 2017, pp. 3–17, doi:<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>.","short":"J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.","bibtex":"@inproceedings{Blömer_Günther_Krummel_Löken_2017, place={Cham}, title={Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>}, booktitle={Foundations and Practice of Security}, publisher={Springer International Publishing}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker and Löken, Nils}, year={2017}, pages={3–17} }","ieee":"J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in <i>Foundations and Practice of Security</i>, 2017, pp. 3–17.","chicago":"Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In <i>Foundations and Practice of Security</i>, 3–17. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">https://doi.org/10.1007/978-3-319-75650-9_1</a>.","ama":"Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: <i>Foundations and Practice of Security</i>. Cham: Springer International Publishing; 2017:3-17. doi:<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>"},"place":"Cham","publication_identifier":{"isbn":["9783319756493","9783319756509"],"issn":["0302-9743","1611-3349"]},"has_accepted_license":"1","publication_status":"published","doi":"10.1007/978-3-319-75650-9_1","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"first_name":"Peter","last_name":"Günther","full_name":"Günther, Peter"},{"last_name":"Krummel","full_name":"Krummel, Volker","first_name":"Volker"},{"first_name":"Nils","id":"13703","full_name":"Löken, Nils","last_name":"Löken"}],"oa":"1","date_updated":"2022-01-06T06:55:55Z","status":"public","type":"conference","file_date_updated":"2018-11-08T09:53:34Z","department":[{"_id":"64"}],"user_id":"13703","_id":"2344","project":[{"name":"SFB 901 - Subproject C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901","_id":"1"},{"name":"Securing the Financial Cloud","_id":"43"}],"year":"2017","title":"Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations","date_created":"2018-04-13T11:40:48Z","publisher":"Springer International Publishing","file":[{"file_id":"5292","file_name":"Attribute-BasedEncryptionAsASe.pdf","access_level":"closed","file_size":634736,"creator":"ups","date_created":"2018-11-02T15:04:13Z","date_updated":"2018-11-02T15:04:13Z","relation":"main_file","success":1,"content_type":"application/pdf"},{"file_id":"5425","access_level":"open_access","file_name":"abe_aas.pdf","file_size":522516,"creator":"nilo","date_created":"2018-11-08T09:53:34Z","date_updated":"2018-11-08T09:53:34Z","relation":"main_file","content_type":"application/pdf"}],"publication":"Foundations and Practice of Security","language":[{"iso":"eng"}],"ddc":["000"]},{"year":"2017","date_created":"2018-04-17T12:20:53Z","publisher":"Springer International Publishing","title":"Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems","publication":"Lecture Notes in Computer Science","abstract":[{"text":"Metric facility location and K-means are well-known problems of combinatorial optimization. Both admit a fairly simple heuristic called single-swap, which adds, drops or swaps open facilities until it reaches a local optimum. For both problems, it is known that this algorithm produces a solution that is at most a constant factor worse than the respective global optimum. In this paper, we show that single-swap applied to the weighted metric uncapacitated facility location and weighted discrete K-means problem is tightly PLS-complete and hence has exponential worst-case running time.","lang":"eng"}],"language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9783319575858","9783319575865"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"116-127","intvolume":"     10236","citation":{"ama":"Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. <i>Lecture Notes in Computer Science</i>. Vol 10236. Cham: Springer International Publishing; 2017:116-127. doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">10.1007/978-3-319-57586-5_11</a>","ieee":"S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems,” in <i>Lecture Notes in Computer Science</i>, vol. 10236, D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International Publishing, 2017, pp. 116–127.","chicago":"Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” In <i>Lecture Notes in Computer Science</i>, edited by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">https://doi.org/10.1007/978-3-319-57586-5_11</a>.","apa":"Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In D. Fotakis, A. Pagourtzis, &#38; V. T. Paschos (Eds.), <i>Lecture Notes in Computer Science</i> (Vol. 10236, pp. 116–127). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">https://doi.org/10.1007/978-3-319-57586-5_11</a>","short":"S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127.","mla":"Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” <i>Lecture Notes in Computer Science</i>, edited by Dimitris Fotakis et al., vol. 10236, Springer International Publishing, 2017, pp. 116–27, doi:<a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">10.1007/978-3-319-57586-5_11</a>.","bibtex":"@inbook{Brauer_2017, place={Cham}, title={Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems}, volume={10236}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-57586-5_11\">10.1007/978-3-319-57586-5_11</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Brauer, Sascha}, editor={Fotakis, Dimitris and Pagourtzis, Aris and Paschos, Vangelis Th.Editors}, year={2017}, pages={116–127} }"},"place":"Cham","volume":10236,"author":[{"last_name":"Brauer","id":"13291","full_name":"Brauer, Sascha","first_name":"Sascha"}],"date_updated":"2022-01-06T06:56:00Z","doi":"10.1007/978-3-319-57586-5_11","conference":{"start_date":"2017-05-24","name":"10th International Conference on Algorithms and Complexity","location":"Athens, Greece","end_date":"2017-05-26"},"type":"book_chapter","status":"public","editor":[{"first_name":"Dimitris","last_name":"Fotakis","full_name":"Fotakis, Dimitris"},{"first_name":"Aris","full_name":"Pagourtzis, Aris","last_name":"Pagourtzis"},{"last_name":"Paschos","full_name":"Paschos, Vangelis Th.","first_name":"Vangelis Th."}],"department":[{"_id":"64"}],"user_id":"13291","_id":"2381"},{"citation":{"mla":"Niehus, David. <i>Semantically Secure Attribute-Based Searchable Encryption</i>. Universität Paderborn, 2017.","bibtex":"@book{Niehus_2017, title={Semantically Secure Attribute-based Searchable Encryption}, publisher={Universität Paderborn}, author={Niehus, David}, year={2017} }","short":"D. Niehus, Semantically Secure Attribute-Based Searchable Encryption, Universität Paderborn, 2017.","apa":"Niehus, D. (2017). <i>Semantically Secure Attribute-based Searchable Encryption</i>. Universität Paderborn.","ama":"Niehus D. <i>Semantically Secure Attribute-Based Searchable Encryption</i>. Universität Paderborn; 2017.","ieee":"D. Niehus, <i>Semantically Secure Attribute-based Searchable Encryption</i>. Universität Paderborn, 2017.","chicago":"Niehus, David. <i>Semantically Secure Attribute-Based Searchable Encryption</i>. Universität Paderborn, 2017."},"year":"2017","title":"Semantically Secure Attribute-based Searchable Encryption","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"date_created":"2017-10-17T12:41:03Z","author":[{"full_name":"Niehus, David","last_name":"Niehus","first_name":"David"}],"date_updated":"2022-01-06T07:02:49Z","publisher":"Universität Paderborn","status":"public","type":"mastersthesis","user_id":"477","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"60"},{"year":"2017","citation":{"ama":"Ganesh Athreya A. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn; 2017.","chicago":"Ganesh Athreya, Advait. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn, 2017.","ieee":"A. Ganesh Athreya, <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn, 2017.","short":"A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings, Universität Paderborn, 2017.","mla":"Ganesh Athreya, Advait. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn, 2017.","bibtex":"@book{Ganesh Athreya_2017, title={Instantiating a Predicate Encryption Scheme via Pair Encodings}, publisher={Universität Paderborn}, author={Ganesh Athreya, Advait}, year={2017} }","apa":"Ganesh Athreya, A. (2017). <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn."},"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:04:02Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_created":"2017-10-17T12:41:08Z","author":[{"first_name":"Advait","full_name":"Ganesh Athreya, Advait","last_name":"Ganesh Athreya"}],"title":"Instantiating a Predicate Encryption Scheme via Pair Encodings","type":"bachelorsthesis","status":"public","_id":"88","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"64"}],"user_id":"477"},{"author":[{"first_name":"Mirko","full_name":"Jürgens, Mirko","last_name":"Jürgens"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_created":"2017-10-17T12:41:04Z","date_updated":"2022-01-06T07:03:15Z","publisher":"Universität Paderborn","title":"Provably Secure Key-Derivation-Functions for Certain Types of Applications","citation":{"apa":"Jürgens, M. (2017). <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn.","mla":"Jürgens, Mirko. <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn, 2017.","short":"M. Jürgens, Provably Secure Key-Derivation-Functions for Certain Types of Applications, Universität Paderborn, 2017.","bibtex":"@book{Jürgens_2017, title={Provably Secure Key-Derivation-Functions for Certain Types of Applications}, publisher={Universität Paderborn}, author={Jürgens, Mirko}, year={2017} }","ama":"Jürgens M. <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn; 2017.","ieee":"M. Jürgens, <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn, 2017.","chicago":"Jürgens, Mirko. <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn, 2017."},"year":"2017","user_id":"477","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"67","type":"bachelorsthesis","status":"public"},{"type":"bachelorsthesis","status":"public","_id":"104","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"64"}],"user_id":"477","year":"2017","citation":{"bibtex":"@book{Diemert_2017, title={EAX - An Authenticated Encryption Mode for Block Ciphers}, publisher={Universität Paderborn}, author={Diemert, Denis}, year={2017} }","mla":"Diemert, Denis. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn, 2017.","short":"D. Diemert, EAX - An Authenticated Encryption Mode for Block Ciphers, Universität Paderborn, 2017.","apa":"Diemert, D. (2017). <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn.","chicago":"Diemert, Denis. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn, 2017.","ieee":"D. Diemert, <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn, 2017.","ama":"Diemert D. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn; 2017."},"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:50:38Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_created":"2017-10-17T12:41:11Z","author":[{"last_name":"Diemert","full_name":"Diemert, Denis","first_name":"Denis"}],"title":"EAX - An Authenticated Encryption Mode for Block Ciphers"},{"department":[{"_id":"64"}],"user_id":"25078","_id":"117","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"type":"mastersthesis","status":"public","author":[{"last_name":"Bemmann","id":"32571","full_name":"Bemmann, Pascal","first_name":"Pascal"}],"supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_created":"2017-10-17T12:41:14Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:51:06Z","title":"Attribute-based Signatures using Structure Preserving Signatures","citation":{"ieee":"P. Bemmann, <i>Attribute-based Signatures using Structure Preserving Signatures</i>. Universität Paderborn, 2017.","chicago":"Bemmann, Pascal. <i>Attribute-Based Signatures Using Structure Preserving Signatures</i>. Universität Paderborn, 2017.","ama":"Bemmann P. <i>Attribute-Based Signatures Using Structure Preserving Signatures</i>. Universität Paderborn; 2017.","bibtex":"@book{Bemmann_2017, title={Attribute-based Signatures using Structure Preserving Signatures}, publisher={Universität Paderborn}, author={Bemmann, Pascal}, year={2017} }","short":"P. Bemmann, Attribute-Based Signatures Using Structure Preserving Signatures, Universität Paderborn, 2017.","mla":"Bemmann, Pascal. <i>Attribute-Based Signatures Using Structure Preserving Signatures</i>. Universität Paderborn, 2017.","apa":"Bemmann, P. (2017). <i>Attribute-based Signatures using Structure Preserving Signatures</i>. Universität Paderborn."},"year":"2017"},{"date_created":"2018-05-25T09:43:39Z","author":[{"first_name":"Eduard","full_name":"Weis, Eduard","last_name":"Weis"}],"supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_updated":"2022-01-06T06:58:42Z","title":"Searchable Encryption","citation":{"apa":"Weis, E. (2016). <i>Searchable Encryption</i>.","bibtex":"@book{Weis_2016, title={Searchable Encryption}, author={Weis, Eduard}, year={2016} }","short":"E. Weis, Searchable Encryption, 2016.","mla":"Weis, Eduard. <i>Searchable Encryption</i>. 2016.","ama":"Weis E. <i>Searchable Encryption</i>.; 2016.","chicago":"Weis, Eduard. <i>Searchable Encryption</i>, 2016.","ieee":"E. Weis, <i>Searchable Encryption</i>. 2016."},"year":"2016","user_id":"25078","department":[{"_id":"64"}],"_id":"2898","type":"mastersthesis","status":"public"},{"status":"public","publication":"2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)","type":"conference","_id":"2947","project":[{"_id":"43","name":"Securing the Financial Cloud"}],"department":[{"_id":"64"}],"user_id":"25078","year":"2016","citation":{"ama":"Blömer J, Günther P. Singular Curve Point Decompression Attack. In: <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/fdtc.2015.17\">10.1109/fdtc.2015.17</a>","chicago":"Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.” In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/fdtc.2015.17\">https://doi.org/10.1109/fdtc.2015.17</a>.","ieee":"J. Blömer and P. Günther, “Singular Curve Point Decompression Attack,” in <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>, 2016.","mla":"Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.” <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/fdtc.2015.17\">10.1109/fdtc.2015.17</a>.","bibtex":"@inproceedings{Blömer_Günther_2016, title={Singular Curve Point Decompression Attack}, DOI={<a href=\"https://doi.org/10.1109/fdtc.2015.17\">10.1109/fdtc.2015.17</a>}, booktitle={2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)}, publisher={IEEE}, author={Blömer, Johannes and Günther, Peter}, year={2016} }","short":"J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), IEEE, 2016.","apa":"Blömer, J., &#38; Günther, P. (2016). Singular Curve Point Decompression Attack. In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE. <a href=\"https://doi.org/10.1109/fdtc.2015.17\">https://doi.org/10.1109/fdtc.2015.17</a>"},"publication_identifier":{"isbn":["9781467375795"]},"publication_status":"published","title":"Singular Curve Point Decompression Attack","doi":"10.1109/fdtc.2015.17","date_updated":"2022-01-06T06:58:48Z","publisher":"IEEE","author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"first_name":"Peter","last_name":"Günther","full_name":"Günther, Peter"}],"date_created":"2018-05-29T11:25:43Z"},{"user_id":"25078","department":[{"_id":"64"}],"project":[{"_id":"43","name":"Securing the Financial Cloud"}],"_id":"2948","type":"book_chapter","publication":"Mathematical Aspects of Computer and Information Sciences","status":"public","author":[{"last_name":"Günther","full_name":"Günther, Peter","first_name":"Peter"},{"first_name":"Volker","last_name":"Krummel","full_name":"Krummel, Volker"}],"date_created":"2018-05-29T11:26:56Z","publisher":"Springer International Publishing","date_updated":"2022-01-06T06:58:48Z","doi":"10.1007/978-3-319-32859-1_13","title":"Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures","publication_status":"published","publication_identifier":{"isbn":["9783319328584","9783319328591"],"issn":["0302-9743","1611-3349"]},"citation":{"apa":"Günther, P., &#38; Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In <i>Mathematical Aspects of Computer and Information Sciences</i> (pp. 151–165). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>","bibtex":"@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>}, booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016}, pages={151–165} }","mla":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” <i>Mathematical Aspects of Computer and Information Sciences</i>, Springer International Publishing, 2016, pp. 151–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>.","short":"P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.","ama":"Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: <i>Mathematical Aspects of Computer and Information Sciences</i>. Cham: Springer International Publishing; 2016:151-165. doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>","ieee":"P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in <i>Mathematical Aspects of Computer and Information Sciences</i>, Cham: Springer International Publishing, 2016, pp. 151–165.","chicago":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” In <i>Mathematical Aspects of Computer and Information Sciences</i>, 151–65. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>."},"page":"151-165","place":"Cham","year":"2016"},{"page":"81-116","citation":{"apa":"Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i> (pp. 81–116). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>","mla":"Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016, pp. 81–116, doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>.","bibtex":"@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical Analysis of the k-Means Algorithm – A Survey}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>}, booktitle={Algorithm Engineering}, publisher={Springer International Publishing}, author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}, year={2016}, pages={81–116} }","short":"J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.","ieee":"J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer International Publishing, 2016, pp. 81–116.","chicago":"Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>.","ama":"Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International Publishing; 2016:81-116. doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>"},"place":"Cham","year":"2016","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319494869","9783319494876"]},"publication_status":"published","doi":"10.1007/978-3-319-49487-6_3","title":"Theoretical Analysis of the k-Means Algorithm – A Survey","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"first_name":"Christiane","last_name":"Lammersen","full_name":"Lammersen, Christiane"},{"full_name":"Schmidt, Melanie","last_name":"Schmidt","first_name":"Melanie"},{"first_name":"Christian","last_name":"Sohler","full_name":"Sohler, Christian"}],"date_created":"2018-06-04T12:22:40Z","date_updated":"2022-01-06T06:58:49Z","publisher":"Springer International Publishing","status":"public","publication":"Algorithm Engineering","type":"book_chapter","department":[{"_id":"64"}],"user_id":"25078","_id":"2968"}]
