@inbook{2968,
  author       = {{Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}},
  booktitle    = {{Algorithm Engineering}},
  isbn         = {{9783319494869}},
  issn         = {{0302-9743}},
  pages        = {{81--116}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Theoretical Analysis of the k-Means Algorithm – A Survey}}},
  doi          = {{10.1007/978-3-319-49487-6_3}},
  year         = {{2016}},
}

@unpublished{2969,
  author       = {{Blömer, Johannes and Brauer, Sascha and Bujna, Kathrin}},
  publisher    = {{Computing Research Repository}},
  title        = {{{Hard-Clustering with Gaussian Mixture Models}}},
  year         = {{2016}},
}

@inbook{2970,
  author       = {{Blömer, Johannes and Bujna, Kathrin}},
  booktitle    = {{Advances in Knowledge Discovery and Data Mining}},
  isbn         = {{9783319317496}},
  issn         = {{0302-9743}},
  pages        = {{296--308}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Adaptive Seeding for Gaussian Mixture Models}}},
  doi          = {{10.1007/978-3-319-31750-2_24}},
  year         = {{2016}},
}

@techreport{2971,
  author       = {{Blömer, Johannes and Günther, Peter}},
  publisher    = {{Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops}},
  title        = {{{Effizienz und Sicherheit paarungsbasierter Kryptographie}}},
  year         = {{2016}},
}

@article{3112,
  author       = {{Hofheinz, Dennis and Jager, Tibor}},
  journal      = {{Des. Codes Cryptography}},
  number       = {{1}},
  pages        = {{29----61}},
  title        = {{{Tightly secure signatures and public-key encryption}}},
  doi          = {{10.1007/s10623-015-0062-x}},
  year         = {{2016}},
}

@article{3113,
  author       = {{Heuer, Felix and Jager, Tibor and Schäge, Sven and Kiltz, Eike}},
  journal      = {{IET Information Security}},
  number       = {{6}},
  pages        = {{304----318}},
  title        = {{{Selective opening security of practical public-key encryption schemes}}},
  doi          = {{10.1049/iet-ifs.2015.0507}},
  year         = {{2016}},
}

@article{3114,
  author       = {{Jager, Tibor and Rupp, Andy}},
  journal      = {{PoPETs}},
  number       = {{3}},
  pages        = {{62----82}},
  title        = {{{Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}}},
  year         = {{2016}},
}

@inproceedings{3115,
  author       = {{Hofheinz, Dennis and Jager, Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark}},
  booktitle    = {{Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II}},
  pages        = {{715----744}},
  title        = {{{How to Generate and Use Universal Samplers}}},
  doi          = {{10.1007/978-3-662-53890-6_24}},
  year         = {{2016}},
}

@inproceedings{3116,
  author       = {{Horst, Matthias and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}},
  booktitle    = {{Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings}},
  pages        = {{159----175}},
  title        = {{{Breaking PPTP VPNs via RADIUS Encryption}}},
  doi          = {{10.1007/978-3-319-48965-0_10}},
  year         = {{2016}},
}

@inproceedings{3117,
  author       = {{Bader, Christoph and Jager, Tibor and Li, Yong and Schäge, Sven}},
  booktitle    = {{Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II}},
  pages        = {{273----304}},
  title        = {{{On the Impossibility of Tight Cryptographic Reductions}}},
  doi          = {{10.1007/978-3-662-49896-5_10}},
  year         = {{2016}},
}

@inproceedings{3118,
  author       = {{Hofheinz, Dennis and Jager, Tibor and Rupp, Andy}},
  booktitle    = {{Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}},
  pages        = {{146----168}},
  title        = {{{Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}}},
  doi          = {{10.1007/978-3-662-53644-5_6}},
  year         = {{2016}},
}

@inproceedings{3119,
  author       = {{Hofheinz, Dennis and Jager, Tibor}},
  booktitle    = {{Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I}},
  pages        = {{336----362}},
  title        = {{{Verifiable Random Functions from Standard Assumptions}}},
  doi          = {{10.1007/978-3-662-49096-9_14}},
  year         = {{2016}},
}

@inproceedings{3157,
  author       = {{Beringer, Steffen and Wehrheim, Heike}},
  booktitle    = {{Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings}},
  editor       = {{H. ter Beek, Maurice and Gnesi, Stefania and Knapp, Alexander}},
  pages        = {{189----204}},
  title        = {{{Verification of AUTOSAR Software Architectures with Timed Automata}}},
  doi          = {{10.1007/978-3-319-45943-1_13}},
  year         = {{2016}},
}

@inproceedings{3158,
  author       = {{Travkin, Oleg and Wehrheim, Heike}},
  booktitle    = {{Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings}},
  editor       = {{Sampaio, Augusto and Wang, Farn}},
  pages        = {{3----24}},
  title        = {{{Verification of Concurrent Programs on Weak Memory Models}}},
  doi          = {{10.1007/978-3-319-46750-4_1}},
  year         = {{2016}},
}

@inproceedings{3159,
  author       = {{Schellhorn, Gerhard and Travkin, Oleg and Wehrheim, Heike}},
  booktitle    = {{Integrated Formal Methods - 12th International Conference, {IFM} 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings}},
  editor       = {{Huisman, Marieke}},
  pages        = {{193----209}},
  title        = {{{Towards a Thread-Local Proof Technique for Starvation Freedom}}},
  doi          = {{10.1007/978-3-319-33693-0_13}},
  year         = {{2016}},
}

@inproceedings{3160,
  author       = {{Doherty, Simon and Dongol, Brijesh and Derrick, John and Schellhorn, Gerhard and Wehrheim, Heike}},
  booktitle    = {{20th International Conference on Principles of Distributed Systems, {OPODIS} 2016, December 13-16, 2016, Madrid, Spain}},
  editor       = {{Fatourou, Panagiota and Jim{\'{e}}nez, Ernesto and Pedone, Fernando}},
  pages        = {{35:1----35:17}},
  title        = {{{Proving Opacity of a Pessimistic {STM}}}},
  doi          = {{10.4230/LIPIcs.OPODIS.2016.35}},
  year         = {{2016}},
}

@article{3161,
  author       = {{Isenberg, Tobias and Jakobs, Marie{-}Christine and Pauck, Felix and Wehrheim, Heike}},
  journal      = {{CoRR}},
  title        = {{{Deriving approximation tolerance constraints from verification runs}}},
  year         = {{2016}},
}

@misc{210,
  author       = {{Leder, Lennart}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Congestion Games with Mixed Objectives}}},
  year         = {{2016}},
}

@misc{213,
  author       = {{Porzenheim, Laurens}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes}}},
  year         = {{2016}},
}

@misc{214,
  author       = {{Bemmann, Kai Sören}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Commitment Schemes - Definitions, Variants, and Security}}},
  year         = {{2016}},
}

