---
_id: '3318'
author:
- first_name: Vitalik
  full_name: Melnikov, Vitalik
  last_name: Melnikov
- first_name: Eyke
  full_name: Hüllermeier, Eyke
  id: '48129'
  last_name: Hüllermeier
- first_name: Daniel
  full_name: Kaimann, Daniel
  id: '18949'
  last_name: Kaimann
- first_name: 'Bernd '
  full_name: 'Frick, Bernd '
  last_name: Frick
- first_name: ' Pritha '
  full_name: 'Gupta,  Pritha '
  last_name: Gupta
citation:
  ama: 'Melnikov V, Hüllermeier E, Kaimann D, Frick B, Gupta  Pritha . Pairwise versus
    Pointwise Ranking: A Case Study. <i>Schedae Informaticae</i>. 2016;25. doi:<a
    href="https://doi.org/10.4467/20838476si.16.006.6187">10.4467/20838476si.16.006.6187</a>'
  apa: 'Melnikov, V., Hüllermeier, E., Kaimann, D., Frick, B., &#38; Gupta,  Pritha
    . (2016). Pairwise versus Pointwise Ranking: A Case Study. <i>Schedae Informaticae</i>,
    <i>25</i>. <a href="https://doi.org/10.4467/20838476si.16.006.6187">https://doi.org/10.4467/20838476si.16.006.6187</a>'
  bibtex: '@article{Melnikov_Hüllermeier_Kaimann_Frick_Gupta_2016, title={Pairwise
    versus Pointwise Ranking: A Case Study}, volume={25}, DOI={<a href="https://doi.org/10.4467/20838476si.16.006.6187">10.4467/20838476si.16.006.6187</a>},
    journal={Schedae Informaticae}, publisher={Uniwersytet Jagiellonski - Wydawnictwo
    Uniwersytetu Jagiellonskiego}, author={Melnikov, Vitalik and Hüllermeier, Eyke
    and Kaimann, Daniel and Frick, Bernd  and Gupta,  Pritha }, year={2016} }'
  chicago: 'Melnikov, Vitalik, Eyke Hüllermeier, Daniel Kaimann, Bernd  Frick, and  Pritha  Gupta.
    “Pairwise versus Pointwise Ranking: A Case Study.” <i>Schedae Informaticae</i>
    25 (2016). <a href="https://doi.org/10.4467/20838476si.16.006.6187">https://doi.org/10.4467/20838476si.16.006.6187</a>.'
  ieee: 'V. Melnikov, E. Hüllermeier, D. Kaimann, B. Frick, and  Pritha  Gupta, “Pairwise
    versus Pointwise Ranking: A Case Study,” <i>Schedae Informaticae</i>, vol. 25,
    2016.'
  mla: 'Melnikov, Vitalik, et al. “Pairwise versus Pointwise Ranking: A Case Study.”
    <i>Schedae Informaticae</i>, vol. 25, Uniwersytet Jagiellonski - Wydawnictwo Uniwersytetu
    Jagiellonskiego, 2016, doi:<a href="https://doi.org/10.4467/20838476si.16.006.6187">10.4467/20838476si.16.006.6187</a>.'
  short: V. Melnikov, E. Hüllermeier, D. Kaimann, B. Frick,  Pritha  Gupta, Schedae
    Informaticae 25 (2016).
date_created: 2018-06-22T14:49:40Z
date_updated: 2022-01-06T06:59:10Z
ddc:
- '000'
department:
- _id: '355'
- _id: '183'
doi: 10.4467/20838476si.16.006.6187
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T15:54:38Z
  date_updated: 2018-11-02T15:54:38Z
  file_id: '5317'
  file_name: roz-6-Melnikov.pdf
  file_size: 1002478
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T15:54:38Z
has_accepted_license: '1'
intvolume: '        25'
language:
- iso: eng
project:
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '11'
  name: SFB 901 - Subproject B3
- _id: '8'
  name: SFB 901 - Subproject A4
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
publication: Schedae Informaticae
publication_identifier:
  issn:
  - 2083-8476
publication_status: published
publisher: Uniwersytet Jagiellonski - Wydawnictwo Uniwersytetu Jagiellonskiego
status: public
title: 'Pairwise versus Pointwise Ranking: A Case Study'
type: journal_article
user_id: '15504'
volume: 25
year: '2016'
...
---
_id: '3747'
author:
- first_name: Khalid
  full_name: Al Khatib, Khalid
  last_name: Al Khatib
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Johannes
  full_name: Kiesel, Johannes
  last_name: Kiesel
- first_name: Matthias
  full_name: Hagen, Matthias
  last_name: Hagen
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
citation:
  ama: 'Al Khatib K, Wachsmuth H, Kiesel J, Hagen M, Stein B. A News Editorial Corpus
    for Mining Argumentation Strategies. In: <i>Proceedings of COLING 2016, the 26th
    International Conference on Computational Linguistics: Technical Papers</i>. ;
    2016:3433-3443.'
  apa: 'Al Khatib, K., Wachsmuth, H., Kiesel, J., Hagen, M., &#38; Stein, B. (2016).
    A News Editorial Corpus for Mining Argumentation Strategies. In <i>Proceedings
    of COLING 2016, the 26th International Conference on Computational Linguistics:
    Technical Papers</i> (pp. 3433–3443).'
  bibtex: '@inproceedings{Al Khatib_Wachsmuth_Kiesel_Hagen_Stein_2016, title={A News
    Editorial Corpus for Mining Argumentation Strategies}, booktitle={Proceedings
    of COLING 2016, the 26th International Conference on Computational Linguistics:
    Technical Papers}, author={Al Khatib, Khalid and Wachsmuth, Henning and Kiesel,
    Johannes and Hagen, Matthias and Stein, Benno}, year={2016}, pages={3433–3443}
    }'
  chicago: 'Al Khatib, Khalid, Henning Wachsmuth, Johannes Kiesel, Matthias Hagen,
    and Benno Stein. “A News Editorial Corpus for Mining Argumentation Strategies.”
    In <i>Proceedings of COLING 2016, the 26th International Conference on Computational
    Linguistics: Technical Papers</i>, 3433–43, 2016.'
  ieee: 'K. Al Khatib, H. Wachsmuth, J. Kiesel, M. Hagen, and B. Stein, “A News Editorial
    Corpus for Mining Argumentation Strategies,” in <i>Proceedings of COLING 2016,
    the 26th International Conference on Computational Linguistics: Technical Papers</i>,
    2016, pp. 3433–3443.'
  mla: 'Al Khatib, Khalid, et al. “A News Editorial Corpus for Mining Argumentation
    Strategies.” <i>Proceedings of COLING 2016, the 26th International Conference
    on Computational Linguistics: Technical Papers</i>, 2016, pp. 3433–43.'
  short: 'K. Al Khatib, H. Wachsmuth, J. Kiesel, M. Hagen, B. Stein, in: Proceedings
    of COLING 2016, the 26th International Conference on Computational Linguistics:
    Technical Papers, 2016, pp. 3433–3443.'
date_created: 2018-08-02T11:32:06Z
date_updated: 2022-01-06T06:59:34Z
department:
- _id: '600'
language:
- iso: eng
main_file_link:
- url: https://www.aclweb.org/anthology/C16-1324.pdf
page: 3433-3443
publication: 'Proceedings of COLING 2016, the 26th International Conference on Computational
  Linguistics: Technical Papers'
status: public
title: A News Editorial Corpus for Mining Argumentation Strategies
type: conference
user_id: '82920'
year: '2016'
...
---
_id: '3801'
author:
- first_name: Khalid
  full_name: Al-Khatib, Khalid
  last_name: Al-Khatib
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Matthias
  full_name: Hagen, Matthias
  last_name: Hagen
- first_name: Jonas
  full_name: Köhler, Jonas
  last_name: Köhler
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
citation:
  ama: 'Al-Khatib K, Wachsmuth H, Hagen M, Köhler J, Stein B. Cross-Domain Mining
    of Argumentative Text through Distant Supervision. In: <i>Proceedings of the 2016
    Conference of the North American Chapter of the Association for Computational
    Linguistics: Human Language Technologies</i>. ; 2016:1395-1404. doi:<a href="https://doi.org/10.18653/v1/N16-1165">10.18653/v1/N16-1165</a>'
  apa: 'Al-Khatib, K., Wachsmuth, H., Hagen, M., Köhler, J., &#38; Stein, B. (2016).
    Cross-Domain Mining of Argumentative Text through Distant Supervision. In <i>Proceedings
    of the 2016 Conference of the North American Chapter of the Association for Computational
    Linguistics: Human Language Technologies</i> (pp. 1395–1404). <a href="https://doi.org/10.18653/v1/N16-1165">https://doi.org/10.18653/v1/N16-1165</a>'
  bibtex: '@inproceedings{Al-Khatib_Wachsmuth_Hagen_Köhler_Stein_2016, title={Cross-Domain
    Mining of Argumentative Text through Distant Supervision}, DOI={<a href="https://doi.org/10.18653/v1/N16-1165">10.18653/v1/N16-1165</a>},
    booktitle={Proceedings of the 2016 Conference of the North American Chapter of
    the Association for Computational Linguistics: Human Language Technologies}, author={Al-Khatib,
    Khalid and Wachsmuth, Henning and Hagen, Matthias and Köhler, Jonas and Stein,
    Benno}, year={2016}, pages={1395–1404} }'
  chicago: 'Al-Khatib, Khalid, Henning Wachsmuth, Matthias Hagen, Jonas Köhler, and
    Benno Stein. “Cross-Domain Mining of Argumentative Text through Distant Supervision.”
    In <i>Proceedings of the 2016 Conference of the North American Chapter of the
    Association for Computational Linguistics: Human Language Technologies</i>, 1395–1404,
    2016. <a href="https://doi.org/10.18653/v1/N16-1165">https://doi.org/10.18653/v1/N16-1165</a>.'
  ieee: 'K. Al-Khatib, H. Wachsmuth, M. Hagen, J. Köhler, and B. Stein, “Cross-Domain
    Mining of Argumentative Text through Distant Supervision,” in <i>Proceedings of
    the 2016 Conference of the North American Chapter of the Association for Computational
    Linguistics: Human Language Technologies</i>, 2016, pp. 1395–1404.'
  mla: 'Al-Khatib, Khalid, et al. “Cross-Domain Mining of Argumentative Text through
    Distant Supervision.” <i>Proceedings of the 2016 Conference of the North American
    Chapter of the Association for Computational Linguistics: Human Language Technologies</i>,
    2016, pp. 1395–404, doi:<a href="https://doi.org/10.18653/v1/N16-1165">10.18653/v1/N16-1165</a>.'
  short: 'K. Al-Khatib, H. Wachsmuth, M. Hagen, J. Köhler, B. Stein, in: Proceedings
    of the 2016 Conference of the North American Chapter of the Association for Computational
    Linguistics: Human Language Technologies, 2016, pp. 1395–1404.'
date_created: 2018-08-02T13:38:23Z
date_updated: 2022-01-06T06:59:36Z
department:
- _id: '600'
doi: 10.18653/v1/N16-1165
extern: '1'
language:
- iso: eng
main_file_link:
- url: https://www.aclweb.org/anthology/N16-1165.pdf
page: 1395-1404
publication: 'Proceedings of the 2016 Conference of the North American Chapter of
  the Association for Computational Linguistics: Human Language Technologies'
status: public
title: Cross-Domain Mining of Argumentative Text through Distant Supervision
type: conference
user_id: '82920'
year: '2016'
...
---
_id: '3816'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Khalid
  full_name: Al Khatib, Khalid
  last_name: Al Khatib
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
citation:
  ama: 'Wachsmuth H, Al Khatib K, Stein B. Using Argument Mining to Assess the Argumentation
    Quality of Essays. In: <i>Proceedings of COLING 2016, the 26th International Conference
    on Computational Linguistics: Technical Papers</i>. ; 2016:1680-1691.'
  apa: 'Wachsmuth, H., Al Khatib, K., &#38; Stein, B. (2016). Using Argument Mining
    to Assess the Argumentation Quality of Essays. In <i>Proceedings of COLING 2016,
    the 26th International Conference on Computational Linguistics: Technical Papers</i>
    (pp. 1680–1691).'
  bibtex: '@inproceedings{Wachsmuth_Al Khatib_Stein_2016, title={Using Argument Mining
    to Assess the Argumentation Quality of Essays}, booktitle={Proceedings of COLING
    2016, the 26th International Conference on Computational Linguistics: Technical
    Papers}, author={Wachsmuth, Henning and Al Khatib, Khalid and Stein, Benno}, year={2016},
    pages={1680–1691} }'
  chicago: 'Wachsmuth, Henning, Khalid Al Khatib, and Benno Stein. “Using Argument
    Mining to Assess the Argumentation Quality of Essays.” In <i>Proceedings of COLING
    2016, the 26th International Conference on Computational Linguistics: Technical
    Papers</i>, 1680–91, 2016.'
  ieee: 'H. Wachsmuth, K. Al Khatib, and B. Stein, “Using Argument Mining to Assess
    the Argumentation Quality of Essays,” in <i>Proceedings of COLING 2016, the 26th
    International Conference on Computational Linguistics: Technical Papers</i>, 2016,
    pp. 1680–1691.'
  mla: 'Wachsmuth, Henning, et al. “Using Argument Mining to Assess the Argumentation
    Quality of Essays.” <i>Proceedings of COLING 2016, the 26th International Conference
    on Computational Linguistics: Technical Papers</i>, 2016, pp. 1680–91.'
  short: 'H. Wachsmuth, K. Al Khatib, B. Stein, in: Proceedings of COLING 2016, the
    26th International Conference on Computational Linguistics: Technical Papers,
    2016, pp. 1680–1691.'
date_created: 2018-08-02T13:38:43Z
date_updated: 2022-01-06T06:59:37Z
department:
- _id: '600'
language:
- iso: eng
main_file_link:
- url: https://www.aclweb.org/anthology/C16-1158.pdf
page: 1680-1691
publication: 'Proceedings of COLING 2016, the 26th International Conference on Computational
  Linguistics: Technical Papers'
publication_identifier:
  isbn:
  - 978-3-88579-975-7
status: public
title: Using Argument Mining to Assess the Argumentation Quality of Essays
type: conference
user_id: '82920'
year: '2016'
...
---
_id: '3880'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
citation:
  ama: 'Wachsmuth H. Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse. In:
    <i>Ausgezeichnete Informatikdissertationen 2015</i>. ; 2016:329-338.'
  apa: Wachsmuth, H. (2016). Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse.
    In <i>Ausgezeichnete Informatikdissertationen 2015</i> (pp. 329–338).
  bibtex: '@inproceedings{Wachsmuth_2016, title={Pipelines Für Effiziente und Robuste
    Ad-hoc Textanalyse}, booktitle={Ausgezeichnete Informatikdissertationen 2015},
    author={Wachsmuth, Henning}, year={2016}, pages={329–338} }'
  chicago: Wachsmuth, Henning. “Pipelines Für Effiziente Und Robuste Ad-Hoc Textanalyse.”
    In <i>Ausgezeichnete Informatikdissertationen 2015</i>, 329–38, 2016.
  ieee: H. Wachsmuth, “Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse,” in
    <i>Ausgezeichnete Informatikdissertationen 2015</i>, 2016, pp. 329–338.
  mla: Wachsmuth, Henning. “Pipelines Für Effiziente Und Robuste Ad-Hoc Textanalyse.”
    <i>Ausgezeichnete Informatikdissertationen 2015</i>, 2016, pp. 329–38.
  short: 'H. Wachsmuth, in: Ausgezeichnete Informatikdissertationen 2015, 2016, pp.
    329–338.'
date_created: 2018-08-11T16:16:00Z
date_updated: 2022-01-06T06:59:47Z
department:
- _id: '600'
language:
- iso: eng
main_file_link:
- url: https://dl.gi.de/bitstream/handle/20.500.12116/4595/329.pdf?sequence=1
page: 329-338
publication: Ausgezeichnete Informatikdissertationen 2015
publication_identifier:
  isbn:
  - 978-3-88579-975-7
status: public
title: Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse
type: conference
user_id: '82920'
year: '2016'
...
---
_id: '2898'
author:
- first_name: Eduard
  full_name: Weis, Eduard
  last_name: Weis
citation:
  ama: Weis E. <i>Searchable Encryption</i>.; 2016.
  apa: Weis, E. (2016). <i>Searchable Encryption</i>.
  bibtex: '@book{Weis_2016, title={Searchable Encryption}, author={Weis, Eduard},
    year={2016} }'
  chicago: Weis, Eduard. <i>Searchable Encryption</i>, 2016.
  ieee: E. Weis, <i>Searchable Encryption</i>. 2016.
  mla: Weis, Eduard. <i>Searchable Encryption</i>. 2016.
  short: E. Weis, Searchable Encryption, 2016.
date_created: 2018-05-25T09:43:39Z
date_updated: 2022-01-06T06:58:42Z
department:
- _id: '64'
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Searchable Encryption
type: mastersthesis
user_id: '25078'
year: '2016'
...
---
_id: '2947'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
citation:
  ama: 'Blömer J, Günther P. Singular Curve Point Decompression Attack. In: <i>2015
    Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE; 2016.
    doi:<a href="https://doi.org/10.1109/fdtc.2015.17">10.1109/fdtc.2015.17</a>'
  apa: Blömer, J., &#38; Günther, P. (2016). Singular Curve Point Decompression Attack.
    In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>.
    IEEE. <a href="https://doi.org/10.1109/fdtc.2015.17">https://doi.org/10.1109/fdtc.2015.17</a>
  bibtex: '@inproceedings{Blömer_Günther_2016, title={Singular Curve Point Decompression
    Attack}, DOI={<a href="https://doi.org/10.1109/fdtc.2015.17">10.1109/fdtc.2015.17</a>},
    booktitle={2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)},
    publisher={IEEE}, author={Blömer, Johannes and Günther, Peter}, year={2016} }'
  chicago: Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression
    Attack.” In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography
    (FDTC)</i>. IEEE, 2016. <a href="https://doi.org/10.1109/fdtc.2015.17">https://doi.org/10.1109/fdtc.2015.17</a>.
  ieee: J. Blömer and P. Günther, “Singular Curve Point Decompression Attack,” in
    <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>,
    2016.
  mla: Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.”
    <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>,
    IEEE, 2016, doi:<a href="https://doi.org/10.1109/fdtc.2015.17">10.1109/fdtc.2015.17</a>.
  short: 'J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance
    in Cryptography (FDTC), IEEE, 2016.'
date_created: 2018-05-29T11:25:43Z
date_updated: 2022-01-06T06:58:48Z
department:
- _id: '64'
doi: 10.1109/fdtc.2015.17
project:
- _id: '43'
  name: Securing the Financial Cloud
publication: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
publication_identifier:
  isbn:
  - '9781467375795'
publication_status: published
publisher: IEEE
status: public
title: Singular Curve Point Decompression Attack
type: conference
user_id: '25078'
year: '2016'
...
---
_id: '2948'
author:
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
citation:
  ama: 'Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based
    Smart Card Architectures. In: <i>Mathematical Aspects of Computer and Information
    Sciences</i>. Cham: Springer International Publishing; 2016:151-165. doi:<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>'
  apa: 'Günther, P., &#38; Krummel, V. (2016). Implementing Cryptographic Pairings
    on Accumulator Based Smart Card Architectures. In <i>Mathematical Aspects of Computer
    and Information Sciences</i> (pp. 151–165). Cham: Springer International Publishing.
    <a href="https://doi.org/10.1007/978-3-319-32859-1_13">https://doi.org/10.1007/978-3-319-32859-1_13</a>'
  bibtex: '@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic
    Pairings on Accumulator Based Smart Card Architectures}, DOI={<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>},
    booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer
    International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016},
    pages={151–165} }'
  chicago: 'Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings
    on Accumulator Based Smart Card Architectures.” In <i>Mathematical Aspects of
    Computer and Information Sciences</i>, 151–65. Cham: Springer International Publishing,
    2016. <a href="https://doi.org/10.1007/978-3-319-32859-1_13">https://doi.org/10.1007/978-3-319-32859-1_13</a>.'
  ieee: 'P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator
    Based Smart Card Architectures,” in <i>Mathematical Aspects of Computer and Information
    Sciences</i>, Cham: Springer International Publishing, 2016, pp. 151–165.'
  mla: Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on
    Accumulator Based Smart Card Architectures.” <i>Mathematical Aspects of Computer
    and Information Sciences</i>, Springer International Publishing, 2016, pp. 151–65,
    doi:<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>.
  short: 'P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information
    Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.'
date_created: 2018-05-29T11:26:56Z
date_updated: 2022-01-06T06:58:48Z
department:
- _id: '64'
doi: 10.1007/978-3-319-32859-1_13
page: 151-165
place: Cham
project:
- _id: '43'
  name: Securing the Financial Cloud
publication: Mathematical Aspects of Computer and Information Sciences
publication_identifier:
  isbn:
  - '9783319328584'
  - '9783319328591'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2968'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Christiane
  full_name: Lammersen, Christiane
  last_name: Lammersen
- first_name: Melanie
  full_name: Schmidt, Melanie
  last_name: Schmidt
- first_name: Christian
  full_name: Sohler, Christian
  last_name: Sohler
citation:
  ama: 'Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means
    Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International
    Publishing; 2016:81-116. doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>'
  apa: 'Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical
    Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i>
    (pp. 81–116). Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>'
  bibtex: '@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical
    Analysis of the k-Means Algorithm – A Survey}, DOI={<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>},
    booktitle={Algorithm Engineering}, publisher={Springer International Publishing},
    author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler,
    Christian}, year={2016}, pages={81–116} }'
  chicago: 'Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian
    Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm
    Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>.'
  ieee: 'J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis
    of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer
    International Publishing, 2016, pp. 81–116.'
  mla: Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A
    Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016,
    pp. 81–116, doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>.
  short: 'J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering,
    Springer International Publishing, Cham, 2016, pp. 81–116.'
date_created: 2018-06-04T12:22:40Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-49487-6_3
page: 81-116
place: Cham
publication: Algorithm Engineering
publication_identifier:
  isbn:
  - '9783319494869'
  - '9783319494876'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Theoretical Analysis of the k-Means Algorithm – A Survey
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2969'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Sascha
  full_name: Brauer, Sascha
  id: '13291'
  last_name: Brauer
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: Blömer J, Brauer S, Bujna K. Hard-Clustering with Gaussian Mixture Models.
    2016.
  apa: Blömer, J., Brauer, S., &#38; Bujna, K. (2016). Hard-Clustering with Gaussian
    Mixture Models. Computing Research Repository.
  bibtex: '@article{Blömer_Brauer_Bujna_2016, title={Hard-Clustering with Gaussian
    Mixture Models}, publisher={Computing Research Repository}, author={Blömer, Johannes
    and Brauer, Sascha and Bujna, Kathrin}, year={2016} }'
  chicago: Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Hard-Clustering with
    Gaussian Mixture Models.” Computing Research Repository, 2016.
  ieee: J. Blömer, S. Brauer, and K. Bujna, “Hard-Clustering with Gaussian Mixture
    Models.” Computing Research Repository, 2016.
  mla: Blömer, Johannes, et al. <i>Hard-Clustering with Gaussian Mixture Models</i>.
    Computing Research Repository, 2016.
  short: J. Blömer, S. Brauer, K. Bujna, (2016).
date_created: 2018-06-04T12:26:51Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1603.06478
oa: '1'
publisher: Computing Research Repository
status: public
title: Hard-Clustering with Gaussian Mixture Models
type: preprint
user_id: '25078'
year: '2016'
...
---
_id: '2970'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances
    in Knowledge Discovery and Data Mining</i>. Cham: Springer International Publishing;
    2016:296-308. doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>'
  apa: 'Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture
    Models. In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308).
    Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>'
  bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian
    Mixture Models}, DOI={<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>},
    booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer
    International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016},
    pages={296–308} }'
  chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham:
    Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>.'
  ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in
    <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International
    Publishing, 2016, pp. 296–308.'
  mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International
    Publishing, 2016, pp. 296–308, doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>.
  short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining,
    Springer International Publishing, Cham, 2016, pp. 296–308.'
date_created: 2018-06-04T12:27:21Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-31750-2_24
page: 296-308
place: Cham
publication: Advances in Knowledge Discovery and Data Mining
publication_identifier:
  isbn:
  - '9783319317496'
  - '9783319317502'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Adaptive Seeding for Gaussian Mixture Models
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2971'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
citation:
  ama: Blömer J, Günther P. <i>Effizienz Und Sicherheit Paarungsbasierter Kryptographie</i>.
    Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops; 2016.
  apa: Blömer, J., &#38; Günther, P. (2016). <i>Effizienz und Sicherheit paarungsbasierter
    Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops.
  bibtex: '@book{Blömer_Günther_2016, title={Effizienz und Sicherheit paarungsbasierter
    Kryptographie}, publisher={Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops},
    author={Blömer, Johannes and Günther, Peter}, year={2016} }'
  chicago: Blömer, Johannes, and Peter Günther. <i>Effizienz Und Sicherheit Paarungsbasierter
    Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
  ieee: J. Blömer and P. Günther, <i>Effizienz und Sicherheit paarungsbasierter Kryptographie</i>.
    Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
  mla: Blömer, Johannes, and Peter Günther. <i>Effizienz Und Sicherheit Paarungsbasierter
    Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
  short: J. Blömer, P. Günther, Effizienz Und Sicherheit Paarungsbasierter Kryptographie,
    Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
date_created: 2018-06-05T07:21:25Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
publication_status: published
publisher: Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops
status: public
title: Effizienz und Sicherheit paarungsbasierter Kryptographie
type: report
user_id: '25078'
year: '2016'
...
---
_id: '3112'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: Hofheinz D, Jager T. Tightly secure signatures and public-key encryption. <i>Des
    Codes Cryptography</i>. 2016;(1):29--61. doi:<a href="https://doi.org/10.1007/s10623-015-0062-x">10.1007/s10623-015-0062-x</a>
  apa: Hofheinz, D., &#38; Jager, T. (2016). Tightly secure signatures and public-key
    encryption. <i>Des. Codes Cryptography</i>, (1), 29--61. <a href="https://doi.org/10.1007/s10623-015-0062-x">https://doi.org/10.1007/s10623-015-0062-x</a>
  bibtex: '@article{Hofheinz_Jager_2016, title={Tightly secure signatures and public-key
    encryption}, DOI={<a href="https://doi.org/10.1007/s10623-015-0062-x">10.1007/s10623-015-0062-x</a>},
    number={1}, journal={Des. Codes Cryptography}, author={Hofheinz, Dennis and Jager,
    Tibor}, year={2016}, pages={29--61} }'
  chicago: 'Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key
    Encryption.” <i>Des. Codes Cryptography</i>, no. 1 (2016): 29--61. <a href="https://doi.org/10.1007/s10623-015-0062-x">https://doi.org/10.1007/s10623-015-0062-x</a>.'
  ieee: D. Hofheinz and T. Jager, “Tightly secure signatures and public-key encryption,”
    <i>Des. Codes Cryptography</i>, no. 1, pp. 29--61, 2016.
  mla: Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key
    Encryption.” <i>Des. Codes Cryptography</i>, no. 1, 2016, pp. 29--61, doi:<a href="https://doi.org/10.1007/s10623-015-0062-x">10.1007/s10623-015-0062-x</a>.
  short: D. Hofheinz, T. Jager, Des. Codes Cryptography (2016) 29--61.
date_created: 2018-06-07T09:12:15Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1007/s10623-015-0062-x
extern: '1'
issue: '1'
page: 29--61
publication: Des. Codes Cryptography
status: public
title: Tightly secure signatures and public-key encryption
type: journal_article
user_id: '38235'
year: '2016'
...
---
_id: '3113'
author:
- first_name: Felix
  full_name: Heuer, Felix
  last_name: Heuer
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
citation:
  ama: Heuer F, Jager T, Schäge S, Kiltz E. Selective opening security of practical
    public-key encryption schemes. <i>IET Information Security</i>. 2016;(6):304--318.
    doi:<a href="https://doi.org/10.1049/iet-ifs.2015.0507">10.1049/iet-ifs.2015.0507</a>
  apa: Heuer, F., Jager, T., Schäge, S., &#38; Kiltz, E. (2016). Selective opening
    security of practical public-key encryption schemes. <i>IET Information Security</i>,
    (6), 304--318. <a href="https://doi.org/10.1049/iet-ifs.2015.0507">https://doi.org/10.1049/iet-ifs.2015.0507</a>
  bibtex: '@article{Heuer_Jager_Schäge_Kiltz_2016, title={Selective opening security
    of practical public-key encryption schemes}, DOI={<a href="https://doi.org/10.1049/iet-ifs.2015.0507">10.1049/iet-ifs.2015.0507</a>},
    number={6}, journal={IET Information Security}, author={Heuer, Felix and Jager,
    Tibor and Schäge, Sven and Kiltz, Eike}, year={2016}, pages={304--318} }'
  chicago: 'Heuer, Felix, Tibor Jager, Sven Schäge, and Eike Kiltz. “Selective Opening
    Security of Practical Public-Key Encryption Schemes.” <i>IET Information Security</i>,
    no. 6 (2016): 304--318. <a href="https://doi.org/10.1049/iet-ifs.2015.0507">https://doi.org/10.1049/iet-ifs.2015.0507</a>.'
  ieee: F. Heuer, T. Jager, S. Schäge, and E. Kiltz, “Selective opening security of
    practical public-key encryption schemes,” <i>IET Information Security</i>, no.
    6, pp. 304--318, 2016.
  mla: Heuer, Felix, et al. “Selective Opening Security of Practical Public-Key Encryption
    Schemes.” <i>IET Information Security</i>, no. 6, 2016, pp. 304--318, doi:<a href="https://doi.org/10.1049/iet-ifs.2015.0507">10.1049/iet-ifs.2015.0507</a>.
  short: F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016)
    304--318.
date_created: 2018-06-07T09:12:50Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1049/iet-ifs.2015.0507
extern: '1'
issue: '6'
page: 304--318
publication: IET Information Security
status: public
title: Selective opening security of practical public-key encryption schemes
type: journal_article
user_id: '38235'
year: '2016'
...
---
_id: '3114'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Andy
  full_name: Rupp, Andy
  last_name: Rupp
citation:
  ama: 'Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving
    Way. <i>PoPETs</i>. 2016;(3):62--82.'
  apa: 'Jager, T., &#38; Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way. <i>PoPETs</i>, (3), 62--82.'
  bibtex: '@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way}, number={3}, journal={PoPETs}, author={Jager, Tibor
    and Rupp, Andy}, year={2016}, pages={62--82} }'
  chicago: 'Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3 (2016): 62--82.'
  ieee: 'T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a
    Privacy-Preserving Way,” <i>PoPETs</i>, no. 3, pp. 62--82, 2016.'
  mla: 'Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3, 2016, pp. 62--82.'
  short: T. Jager, A. Rupp, PoPETs (2016) 62--82.
date_created: 2018-06-07T09:13:15Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
extern: '1'
issue: '3'
page: 62--82
publication: PoPETs
status: public
title: 'Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way'
type: journal_article
user_id: '38235'
year: '2016'
...
---
_id: '3115'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Dakshita
  full_name: Khurana, Dakshita
  last_name: Khurana
- first_name: Amit
  full_name: Sahai, Amit
  last_name: Sahai
- first_name: Brent
  full_name: Waters, Brent
  last_name: Waters
- first_name: Mark
  full_name: Zhandry, Mark
  last_name: Zhandry
citation:
  ama: 'Hofheinz D, Jager T, Khurana D, Sahai A, Waters B, Zhandry M. How to Generate
    and Use Universal Samplers. In: <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd
    International Conference on the Theory and Application of Cryptology and Information
    Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>. ; 2016:715--744.
    doi:<a href="https://doi.org/10.1007/978-3-662-53890-6_24">10.1007/978-3-662-53890-6_24</a>'
  apa: Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B., &#38; Zhandry,
    M. (2016). How to Generate and Use Universal Samplers. In <i>Advances in Cryptology
    - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application
    of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings,
    Part II</i> (pp. 715--744). <a href="https://doi.org/10.1007/978-3-662-53890-6_24">https://doi.org/10.1007/978-3-662-53890-6_24</a>
  bibtex: '@inproceedings{Hofheinz_Jager_Khurana_Sahai_Waters_Zhandry_2016, title={How
    to Generate and Use Universal Samplers}, DOI={<a href="https://doi.org/10.1007/978-3-662-53890-6_24">10.1007/978-3-662-53890-6_24</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference
    on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam,
    December 4-8, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager,
    Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark},
    year={2016}, pages={715--744} }'
  chicago: Hofheinz, Dennis, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters,
    and Mark Zhandry. “How to Generate and Use Universal Samplers.” In <i>Advances
    in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and
    Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8,
    2016, Proceedings, Part II</i>, 715--744, 2016. <a href="https://doi.org/10.1007/978-3-662-53890-6_24">https://doi.org/10.1007/978-3-662-53890-6_24</a>.
  ieee: D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How
    to Generate and Use Universal Samplers,” in <i>Advances in Cryptology - ASIACRYPT
    2016 - 22nd International Conference on the Theory and Application of Cryptology
    and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part
    II</i>, 2016, pp. 715--744.
  mla: Hofheinz, Dennis, et al. “How to Generate and Use Universal Samplers.” <i>Advances
    in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and
    Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8,
    2016, Proceedings, Part II</i>, 2016, pp. 715--744, doi:<a href="https://doi.org/10.1007/978-3-662-53890-6_24">10.1007/978-3-662-53890-6_24</a>.
  short: 'D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in:
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the
    Theory and Application of Cryptology and Information Security, Hanoi, Vietnam,
    December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.'
date_created: 2018-06-07T09:13:48Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-53890-6_24
extern: '1'
page: 715--744
publication: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference
  on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam,
  December 4-8, 2016, Proceedings, Part II
status: public
title: How to Generate and Use Universal Samplers
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3116'
author:
- first_name: Matthias
  full_name: Horst, Matthias
  last_name: Horst
- first_name: Martin
  full_name: Grothe, Martin
  last_name: Grothe
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Horst M, Grothe M, Jager T, Schwenk J. Breaking PPTP VPNs via RADIUS Encryption.
    In: <i>Cryptology and Network Security - 15th International Conference, CANS 2016,
    Milan, Italy, November 14-16, 2016, Proceedings</i>. ; 2016:159--175. doi:<a href="https://doi.org/10.1007/978-3-319-48965-0_10">10.1007/978-3-319-48965-0_10</a>'
  apa: Horst, M., Grothe, M., Jager, T., &#38; Schwenk, J. (2016). Breaking PPTP VPNs
    via RADIUS Encryption. In <i>Cryptology and Network Security - 15th International
    Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i> (pp.
    159--175). <a href="https://doi.org/10.1007/978-3-319-48965-0_10">https://doi.org/10.1007/978-3-319-48965-0_10</a>
  bibtex: '@inproceedings{Horst_Grothe_Jager_Schwenk_2016, title={Breaking PPTP VPNs
    via RADIUS Encryption}, DOI={<a href="https://doi.org/10.1007/978-3-319-48965-0_10">10.1007/978-3-319-48965-0_10</a>},
    booktitle={Cryptology and Network Security - 15th International Conference, CANS
    2016, Milan, Italy, November 14-16, 2016, Proceedings}, author={Horst, Matthias
    and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}, year={2016}, pages={159--175}
    }'
  chicago: Horst, Matthias, Martin Grothe, Tibor Jager, and Jörg Schwenk. “Breaking
    PPTP VPNs via RADIUS Encryption.” In <i>Cryptology and Network Security - 15th
    International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>,
    159--175, 2016. <a href="https://doi.org/10.1007/978-3-319-48965-0_10">https://doi.org/10.1007/978-3-319-48965-0_10</a>.
  ieee: M. Horst, M. Grothe, T. Jager, and J. Schwenk, “Breaking PPTP VPNs via RADIUS
    Encryption,” in <i>Cryptology and Network Security - 15th International Conference,
    CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175.
  mla: Horst, Matthias, et al. “Breaking PPTP VPNs via RADIUS Encryption.” <i>Cryptology
    and Network Security - 15th International Conference, CANS 2016, Milan, Italy,
    November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175, doi:<a href="https://doi.org/10.1007/978-3-319-48965-0_10">10.1007/978-3-319-48965-0_10</a>.
  short: 'M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security
    - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016,
    Proceedings, 2016, pp. 159--175.'
date_created: 2018-06-07T09:14:34Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-319-48965-0_10
extern: '1'
page: 159--175
publication: Cryptology and Network Security - 15th International Conference, CANS
  2016, Milan, Italy, November 14-16, 2016, Proceedings
status: public
title: Breaking PPTP VPNs via RADIUS Encryption
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3117'
author:
- first_name: Christoph
  full_name: Bader, Christoph
  last_name: Bader
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Yong
  full_name: Li, Yong
  last_name: Li
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
citation:
  ama: 'Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic
    Reductions. In: <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Vienna,
    Austria, May 8-12, 2016, Proceedings, Part II</i>. ; 2016:273--304. doi:<a href="https://doi.org/10.1007/978-3-662-49896-5_10">10.1007/978-3-662-49896-5_10</a>'
  apa: Bader, C., Jager, T., Li, Y., &#38; Schäge, S. (2016). On the Impossibility
    of Tight Cryptographic Reductions. In <i>Advances in Cryptology - EUROCRYPT 2016
    - 35th Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i> (pp. 273--304).
    <a href="https://doi.org/10.1007/978-3-662-49896-5_10">https://doi.org/10.1007/978-3-662-49896-5_10</a>
  bibtex: '@inproceedings{Bader_Jager_Li_Schäge_2016, title={On the Impossibility
    of Tight Cryptographic Reductions}, DOI={<a href="https://doi.org/10.1007/978-3-662-49896-5_10">10.1007/978-3-662-49896-5_10</a>},
    booktitle={Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Vienna,
    Austria, May 8-12, 2016, Proceedings, Part II}, author={Bader, Christoph and Jager,
    Tibor and Li, Yong and Schäge, Sven}, year={2016}, pages={273--304} }'
  chicago: Bader, Christoph, Tibor Jager, Yong Li, and Sven Schäge. “On the Impossibility
    of Tight Cryptographic Reductions.” In <i>Advances in Cryptology - EUROCRYPT 2016
    - 35th Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 273--304,
    2016. <a href="https://doi.org/10.1007/978-3-662-49896-5_10">https://doi.org/10.1007/978-3-662-49896-5_10</a>.
  ieee: C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic
    Reductions,” in <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Vienna,
    Austria, May 8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304.
  mla: Bader, Christoph, et al. “On the Impossibility of Tight Cryptographic Reductions.”
    <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference
    on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May
    8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304, doi:<a href="https://doi.org/10.1007/978-3-662-49896-5_10">10.1007/978-3-662-49896-5_10</a>.
  short: 'C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT
    2016 - 35th Annual International Conference on the Theory and Applications of
    Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II,
    2016, pp. 273--304.'
date_created: 2018-06-07T09:15:15Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-49896-5_10
extern: '1'
page: 273--304
publication: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference
  on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May
  8-12, 2016, Proceedings, Part II
status: public
title: On the Impossibility of Tight Cryptographic Reductions
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3118'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Andy
  full_name: Rupp, Andy
  last_name: Rupp
citation:
  ama: 'Hofheinz D, Jager T, Rupp A. Public-Key Encryption with Simulation-Based Selective-Opening
    Security and Compact Ciphertexts. In: <i>Theory of Cryptography - 14th International
    Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings,
    Part II</i>. ; 2016:146--168. doi:<a href="https://doi.org/10.1007/978-3-662-53644-5_6">10.1007/978-3-662-53644-5_6</a>'
  apa: Hofheinz, D., Jager, T., &#38; Rupp, A. (2016). Public-Key Encryption with
    Simulation-Based Selective-Opening Security and Compact Ciphertexts. In <i>Theory
    of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October
    31 - November 3, 2016, Proceedings, Part II</i> (pp. 146--168). <a href="https://doi.org/10.1007/978-3-662-53644-5_6">https://doi.org/10.1007/978-3-662-53644-5_6</a>
  bibtex: '@inproceedings{Hofheinz_Jager_Rupp_2016, title={Public-Key Encryption with
    Simulation-Based Selective-Opening Security and Compact Ciphertexts}, DOI={<a
    href="https://doi.org/10.1007/978-3-662-53644-5_6">10.1007/978-3-662-53644-5_6</a>},
    booktitle={Theory of Cryptography - 14th International Conference, TCC 2016-B,
    Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}, author={Hofheinz,
    Dennis and Jager, Tibor and Rupp, Andy}, year={2016}, pages={146--168} }'
  chicago: Hofheinz, Dennis, Tibor Jager, and Andy Rupp. “Public-Key Encryption with
    Simulation-Based Selective-Opening Security and Compact Ciphertexts.” In <i>Theory
    of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October
    31 - November 3, 2016, Proceedings, Part II</i>, 146--168, 2016. <a href="https://doi.org/10.1007/978-3-662-53644-5_6">https://doi.org/10.1007/978-3-662-53644-5_6</a>.
  ieee: D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based
    Selective-Opening Security and Compact Ciphertexts,” in <i>Theory of Cryptography
    - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November
    3, 2016, Proceedings, Part II</i>, 2016, pp. 146--168.
  mla: Hofheinz, Dennis, et al. “Public-Key Encryption with Simulation-Based Selective-Opening
    Security and Compact Ciphertexts.” <i>Theory of Cryptography - 14th International
    Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings,
    Part II</i>, 2016, pp. 146--168, doi:<a href="https://doi.org/10.1007/978-3-662-53644-5_6">10.1007/978-3-662-53644-5_6</a>.
  short: 'D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International
    Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings,
    Part II, 2016, pp. 146--168.'
date_created: 2018-06-07T09:15:51Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-53644-5_6
extern: '1'
page: 146--168
publication: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing,
  China, October 31 - November 3, 2016, Proceedings, Part II
status: public
title: Public-Key Encryption with Simulation-Based Selective-Opening Security and
  Compact Ciphertexts
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3119'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: 'Hofheinz D, Jager T. Verifiable Random Functions from Standard Assumptions.
    In: <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel
    Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>. ; 2016:336--362. doi:<a
    href="https://doi.org/10.1007/978-3-662-49096-9_14">10.1007/978-3-662-49096-9_14</a>'
  apa: Hofheinz, D., &#38; Jager, T. (2016). Verifiable Random Functions from Standard
    Assumptions. In <i>Theory of Cryptography - 13th International Conference, TCC
    2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i> (pp. 336--362).
    <a href="https://doi.org/10.1007/978-3-662-49096-9_14">https://doi.org/10.1007/978-3-662-49096-9_14</a>
  bibtex: '@inproceedings{Hofheinz_Jager_2016, title={Verifiable Random Functions
    from Standard Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-662-49096-9_14">10.1007/978-3-662-49096-9_14</a>},
    booktitle={Theory of Cryptography - 13th International Conference, TCC 2016-A,
    Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I}, author={Hofheinz,
    Dennis and Jager, Tibor}, year={2016}, pages={336--362} }'
  chicago: Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard
    Assumptions.” In <i>Theory of Cryptography - 13th International Conference, TCC
    2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 336--362,
    2016. <a href="https://doi.org/10.1007/978-3-662-49096-9_14">https://doi.org/10.1007/978-3-662-49096-9_14</a>.
  ieee: D. Hofheinz and T. Jager, “Verifiable Random Functions from Standard Assumptions,”
    in <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel
    Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 2016, pp. 336--362.
  mla: Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard
    Assumptions.” <i>Theory of Cryptography - 13th International Conference, TCC 2016-A,
    Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 2016, pp. 336--362,
    doi:<a href="https://doi.org/10.1007/978-3-662-49096-9_14">10.1007/978-3-662-49096-9_14</a>.
  short: 'D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference,
    TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016,
    pp. 336--362.'
date_created: 2018-06-07T09:16:30Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-49096-9_14
extern: '1'
page: 336--362
publication: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel
  Aviv, Israel, January 10-13, 2016, Proceedings, Part I
status: public
title: Verifiable Random Functions from Standard Assumptions
type: conference
user_id: '38235'
year: '2016'
...
