@misc{301,
  author       = {{Bobolz, Jan}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Efficient Verifier-Local Revocation for Anonymous Credentials}}},
  year         = {{2015}},
}

@misc{302,
  author       = {{Stroh, Christian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Efficient Attributes for Pairing-Based Anonymous Credentials}}},
  year         = {{2015}},
}

@phdthesis{304,
  author       = {{Koutsopoulos, Andreas}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Dynamics and Efficiency in Topological Self-Stabilization}}},
  year         = {{2015}},
}

@phdthesis{305,
  author       = {{Kniesburges, Sebastian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Distributed Data Structures and the Power of topological Self-Stabilization}}},
  year         = {{2015}},
}

@misc{312,
  author       = {{Schleiter, Patrick}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Constructions of Fully Secure Predicate Encryption Schemes}}},
  year         = {{2015}},
}

@article{3120,
  author       = {{Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph}},
  journal      = {{J. Cryptology}},
  number       = {{1}},
  pages        = {{176----208}},
  title        = {{{Confined Guessing: New Signatures From Standard Assumptions}}},
  doi          = {{10.1007/s00145-014-9183-z}},
  year         = {{2015}},
}

@inproceedings{3121,
  author       = {{Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}},
  booktitle    = {{Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}},
  pages        = {{1185----1196}},
  title        = {{{On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}}},
  doi          = {{10.1145/2810103.2813657}},
  year         = {{2015}},
}

@inproceedings{3122,
  author       = {{Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}},
  booktitle    = {{Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}},
  pages        = {{407----425}},
  title        = {{{Practical Invalid Curve Attacks on TLS-ECDH}}},
  doi          = {{10.1007/978-3-319-24174-6_21}},
  year         = {{2015}},
}

@inproceedings{3123,
  author       = {{Heuer, Felix and Jager, Tibor and Kiltz, Eike and Schäge, Sven}},
  booktitle    = {{Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}},
  pages        = {{27----51}},
  title        = {{{On the Selective Opening Security of Practical Public-Key Encryption Schemes}}},
  doi          = {{10.1007/978-3-662-46447-2_2}},
  year         = {{2015}},
}

@inproceedings{3124,
  author       = {{Bergsma, Florian and Jager, Tibor and Schwenk, Jörg}},
  booktitle    = {{Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}},
  pages        = {{477----494}},
  title        = {{{One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}}},
  doi          = {{10.1007/978-3-662-46447-2_21}},
  year         = {{2015}},
}

@inproceedings{3125,
  author       = {{Jager, Tibor}},
  booktitle    = {{Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}},
  pages        = {{121----143}},
  title        = {{{Verifiable Random Functions from Weaker Assumptions}}},
  doi          = {{10.1007/978-3-662-46497-7_5}},
  year         = {{2015}},
}

@inproceedings{3126,
  author       = {{Bader, Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong}},
  booktitle    = {{Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}},
  pages        = {{629----658}},
  title        = {{{Tightly-Secure Authenticated Key Exchange}}},
  doi          = {{10.1007/978-3-662-46494-6_26}},
  year         = {{2015}},
}

@inproceedings{313,
  abstract     = {{Nowadays, many service providers offer software components in the form of Software as a Service. Requesters that want to discover those services in order to use or to integrate them, need to find out which service satisfies their requirements best. For this purpose, service matching approaches determine how well the specifications of provided services satisfy their requirements (including structural, behavioral, and non-functional requirements). In this paper, we describe the tool-suite MatchBox that allows the integration of existing service matchers and their combination as part of flexibly configurable matching processes. Taking requirements and service specifications as an input, MatchBox is able to execute such matching processes and deliver rich matching results. In contrast to related tools, MatchBox allows users to take into account many different kinds of requirements, while it also provides the flexibility to control the matching process in many different ways. }},
  author       = {{Börding, Paul and Bruns, Melanie and Platenius, Marie Christin}},
  booktitle    = {{10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15)}},
  pages        = {{974----977}},
  title        = {{{Comprehensive Service Matching with MatchBox}}},
  doi          = {{10.1145/2786805.2803181}},
  year         = {{2015}},
}

@misc{316,
  author       = {{Pautz, Jannis}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Budget Games with priced strategies}}},
  year         = {{2015}},
}

@article{3162,
  author       = {{Ziegert, Steffen and Wehrheim, Heike}},
  journal      = {{Computer Science - R & D}},
  number       = {{3-4}},
  pages        = {{303----320}},
  title        = {{{Temporal plans for software architecture reconfiguration}}},
  doi          = {{10.1007/s00450-014-0259-7}},
  year         = {{2015}},
}

@inproceedings{3163,
  author       = {{Meyer, Roland and Wehrheim, Heike}},
  booktitle    = {{Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings}},
  editor       = {{Meyer, Roland and Platzer, Andr{\'{e}} and Wehrheim, Heike}},
  pages        = {{3----4}},
  title        = {{{From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog}}},
  doi          = {{10.1007/978-3-319-23506-6_1}},
  year         = {{2015}},
}

@inproceedings{3164,
  author       = {{Derrick, John and Dongol, Brijesh and Schellhorn, Gerhard and Travkin, Oleg and Wehrheim, Heike}},
  booktitle    = {{{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings}},
  editor       = {{Bj{\o}rner, Nikolaj and S. de Boer, Frank}},
  pages        = {{161----177}},
  title        = {{{Verifying Opacity of a Transactional Mutex Lock}}},
  doi          = {{10.1007/978-3-319-19249-9_11}},
  year         = {{2015}},
}

@inproceedings{3165,
  author       = {{Wehrheim, Heike and Travkin, Oleg}},
  booktitle    = {{Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings}},
  editor       = {{Piterman, Nir}},
  pages        = {{104----119}},
  title        = {{{{TSO} to {SC} via Symbolic Execution}}},
  doi          = {{10.1007/978-3-319-26287-1_7}},
  year         = {{2015}},
}

@proceedings{3166,
  editor       = {{Meyer, Roland and Platzer, Andr{\'{e}} and Wehrheim, Heike}},
  isbn         = {{978-3-319-23505-9}},
  title        = {{{Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings}}},
  doi          = {{10.1007/978-3-319-23506-6}},
  year         = {{2015}},
}

@phdthesis{317,
  author       = {{Jähn, Claudius}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Bewertung von Renderingalgorithmen für komplexe 3-D-Szenen}}},
  year         = {{2015}},
}

