@inbook{26428,
  author       = {{Keil, Reinhard}},
  booktitle    = {{"Eh, the old man, I would like to pay attention". Festschrift for {\ "u} r Joachim Veit for his 60th birthday}},
  editor       = {{Richts, K and Stadler, P}},
  publisher    = {{Allitera M {\" u} nchen}},
  title        = {{{Design of virtual research environments for {\ "u} r detailed philological work}}},
  year         = {{2016}},
}

@article{3318,
  author       = {{Melnikov, Vitalik and Hüllermeier, Eyke and Kaimann, Daniel and Frick, Bernd  and Gupta,  Pritha }},
  issn         = {{2083-8476}},
  journal      = {{Schedae Informaticae}},
  publisher    = {{Uniwersytet Jagiellonski - Wydawnictwo Uniwersytetu Jagiellonskiego}},
  title        = {{{Pairwise versus Pointwise Ranking: A Case Study}}},
  doi          = {{10.4467/20838476si.16.006.6187}},
  volume       = {{25}},
  year         = {{2016}},
}

@inproceedings{3747,
  author       = {{Al Khatib, Khalid and Wachsmuth, Henning and Kiesel, Johannes and Hagen, Matthias and Stein, Benno}},
  booktitle    = {{Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers}},
  pages        = {{3433--3443}},
  title        = {{{A News Editorial Corpus for Mining Argumentation Strategies}}},
  year         = {{2016}},
}

@inproceedings{3801,
  author       = {{Al-Khatib, Khalid and Wachsmuth, Henning and Hagen, Matthias and Köhler, Jonas and Stein, Benno}},
  booktitle    = {{Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies}},
  pages        = {{1395--1404}},
  title        = {{{Cross-Domain Mining of Argumentative Text through Distant Supervision}}},
  doi          = {{10.18653/v1/N16-1165}},
  year         = {{2016}},
}

@inproceedings{3816,
  author       = {{Wachsmuth, Henning and Al Khatib, Khalid and Stein, Benno}},
  booktitle    = {{Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers}},
  isbn         = {{978-3-88579-975-7}},
  pages        = {{1680--1691}},
  title        = {{{Using Argument Mining to Assess the Argumentation Quality of Essays}}},
  year         = {{2016}},
}

@inproceedings{3880,
  author       = {{Wachsmuth, Henning}},
  booktitle    = {{Ausgezeichnete Informatikdissertationen 2015}},
  isbn         = {{978-3-88579-975-7}},
  pages        = {{329--338}},
  title        = {{{Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse}}},
  year         = {{2016}},
}

@misc{2898,
  author       = {{Weis, Eduard}},
  title        = {{{Searchable Encryption}}},
  year         = {{2016}},
}

@inproceedings{2947,
  author       = {{Blömer, Johannes and Günther, Peter}},
  booktitle    = {{2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)}},
  isbn         = {{9781467375795}},
  publisher    = {{IEEE}},
  title        = {{{Singular Curve Point Decompression Attack}}},
  doi          = {{10.1109/fdtc.2015.17}},
  year         = {{2016}},
}

@inbook{2948,
  author       = {{Günther, Peter and Krummel, Volker}},
  booktitle    = {{Mathematical Aspects of Computer and Information Sciences}},
  isbn         = {{9783319328584}},
  issn         = {{0302-9743}},
  pages        = {{151--165}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}}},
  doi          = {{10.1007/978-3-319-32859-1_13}},
  year         = {{2016}},
}

@inbook{2968,
  author       = {{Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}},
  booktitle    = {{Algorithm Engineering}},
  isbn         = {{9783319494869}},
  issn         = {{0302-9743}},
  pages        = {{81--116}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Theoretical Analysis of the k-Means Algorithm – A Survey}}},
  doi          = {{10.1007/978-3-319-49487-6_3}},
  year         = {{2016}},
}

@unpublished{2969,
  author       = {{Blömer, Johannes and Brauer, Sascha and Bujna, Kathrin}},
  publisher    = {{Computing Research Repository}},
  title        = {{{Hard-Clustering with Gaussian Mixture Models}}},
  year         = {{2016}},
}

@inbook{2970,
  author       = {{Blömer, Johannes and Bujna, Kathrin}},
  booktitle    = {{Advances in Knowledge Discovery and Data Mining}},
  isbn         = {{9783319317496}},
  issn         = {{0302-9743}},
  pages        = {{296--308}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Adaptive Seeding for Gaussian Mixture Models}}},
  doi          = {{10.1007/978-3-319-31750-2_24}},
  year         = {{2016}},
}

@techreport{2971,
  author       = {{Blömer, Johannes and Günther, Peter}},
  publisher    = {{Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops}},
  title        = {{{Effizienz und Sicherheit paarungsbasierter Kryptographie}}},
  year         = {{2016}},
}

@article{3112,
  author       = {{Hofheinz, Dennis and Jager, Tibor}},
  journal      = {{Des. Codes Cryptography}},
  number       = {{1}},
  pages        = {{29----61}},
  title        = {{{Tightly secure signatures and public-key encryption}}},
  doi          = {{10.1007/s10623-015-0062-x}},
  year         = {{2016}},
}

@article{3113,
  author       = {{Heuer, Felix and Jager, Tibor and Schäge, Sven and Kiltz, Eike}},
  journal      = {{IET Information Security}},
  number       = {{6}},
  pages        = {{304----318}},
  title        = {{{Selective opening security of practical public-key encryption schemes}}},
  doi          = {{10.1049/iet-ifs.2015.0507}},
  year         = {{2016}},
}

@article{3114,
  author       = {{Jager, Tibor and Rupp, Andy}},
  journal      = {{PoPETs}},
  number       = {{3}},
  pages        = {{62----82}},
  title        = {{{Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}}},
  year         = {{2016}},
}

@inproceedings{3115,
  author       = {{Hofheinz, Dennis and Jager, Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark}},
  booktitle    = {{Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II}},
  pages        = {{715----744}},
  title        = {{{How to Generate and Use Universal Samplers}}},
  doi          = {{10.1007/978-3-662-53890-6_24}},
  year         = {{2016}},
}

@inproceedings{3116,
  author       = {{Horst, Matthias and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}},
  booktitle    = {{Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings}},
  pages        = {{159----175}},
  title        = {{{Breaking PPTP VPNs via RADIUS Encryption}}},
  doi          = {{10.1007/978-3-319-48965-0_10}},
  year         = {{2016}},
}

@inproceedings{3117,
  author       = {{Bader, Christoph and Jager, Tibor and Li, Yong and Schäge, Sven}},
  booktitle    = {{Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II}},
  pages        = {{273----304}},
  title        = {{{On the Impossibility of Tight Cryptographic Reductions}}},
  doi          = {{10.1007/978-3-662-49896-5_10}},
  year         = {{2016}},
}

@inproceedings{3118,
  author       = {{Hofheinz, Dennis and Jager, Tibor and Rupp, Andy}},
  booktitle    = {{Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}},
  pages        = {{146----168}},
  title        = {{{Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}}},
  doi          = {{10.1007/978-3-662-53644-5_6}},
  year         = {{2016}},
}

