@inproceedings{20191,
  author       = {{Hemsen, Paul and Hesse, Marc and Löken, Nils and Nouri, Zahra}},
  booktitle    = {{2nd Crowdworking Symposium}},
  location     = {{Paderborn}},
  title        = {{{Platform-independent Reputation and Qualification System for Crowdwork}}},
  year         = {{2020}},
}

@phdthesis{15482,
  author       = {{Löken, Nils}},
  title        = {{{Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work}}},
  doi          = {{10.17619/UNIPB/1-854}},
  year         = {{2020}},
}

@inproceedings{13554,
  abstract     = {{We propose a novel personal reputation system for cross-platform reputation. We observe that, in certain usage scenarios, e.g. crowd work, the rater anonymity property typically imposed on reputation systems is not necessary. Instead, we propose a relaxed notion of rater anonymity that is more applicable in the crowd work scenario. This allows us to construct a secure personal reputation system from simple cryptographic primitives.}},
  author       = {{Blömer, Johannes and Löken, Nils}},
  booktitle    = {{Security and Trust Management, STM 2019}},
  title        = {{{Personal Cross-Platform Reputation}}},
  doi          = {{10.1007/978-3-030-31511-5_9}},
  volume       = {{11738}},
  year         = {{2019}},
}

@inproceedings{13557,
  abstract     = {{We present a searchable encryption scheme for dynamic document collections in a multi-user scenario. Our scheme features fine-grained access control to search results, as well as access control to operations such as adding documents to the document collection, or changing individual documents. The scheme features verifiability of search results. Our scheme also satisfies the forward privacy notion crucial for the security of dynamic searchable encryption schemes.}},
  author       = {{Blömer, Johannes and Löken, Nils}},
  booktitle    = {{12th International Symposium on Foundations and Practice of Security, FPS 2019}},
  publisher    = {{Springer}},
  title        = {{{Dynamic Searchable Encryption with Access Control}}},
  volume       = {{12056}},
  year         = {{2019}},
}

@inproceedings{2965,
  author       = {{Blömer, Johannes and Löken, Nils}},
  booktitle    = {{Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018}},
  isbn         = {{978-1-4503-6448-5}},
  location     = {{Hamburg, Germany}},
  pages        = {{25:1----25:10}},
  publisher    = {{ACM}},
  title        = {{{Cloud Architectures for Searchable Encryption}}},
  doi          = {{10.1145/3230833.3230853}},
  year         = {{2018}},
}

@inproceedings{2343,
  author       = {{Löken, Nils}},
  booktitle    = {{Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES '17}},
  isbn         = {{9781450352574}},
  publisher    = {{ACM Press}},
  title        = {{{Searchable Encryption with Access Control}}},
  doi          = {{10.1145/3098954.3098987}},
  year         = {{2017}},
}

@inproceedings{2344,
  author       = {{Blömer, Johannes and Günther, Peter and Krummel, Volker and Löken, Nils}},
  booktitle    = {{Foundations and Practice of Security}},
  isbn         = {{9783319756493}},
  issn         = {{0302-9743}},
  pages        = {{3--17}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations}}},
  doi          = {{10.1007/978-3-319-75650-9_1}},
  year         = {{2017}},
}

@inproceedings{253,
  abstract     = {{Group signatures, introduced by Chaum and van Heyst [15], are an important primitive in cryptography. In group signature schemes every group member can anonymously sign messages on behalf of the group. In case of disputes a dedicated opening manager is able to trace signatures - he can extract the identity of the producer of a given signature. A formal model for static group signatures schemes and their security is defined by Bellare, Micciancio, and Warinschi [4], the case of dynamic groups is considered by Bellare, Shi, and Zhang [5]. Both models define group signature schemes with a single opening manager. The main difference between these models is that the number of group members in static schemes is fixed, while in dynamic schemes group members can join the group over time.}},
  author       = {{Blömer, Johannes and Juhnke, Jakob and Löken, Nils}},
  booktitle    = {{Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}},
  pages        = {{166--180}},
  title        = {{{Short Group Signatures with Distributed Traceability}}},
  doi          = {{10.1007/978-3-319-32859-1_14}},
  year         = {{2015}},
}

@misc{325,
  author       = {{Löken, Nils}},
  publisher    = {{Universität Paderborn}},
  title        = {{{A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption}}},
  year         = {{2015}},
}

@misc{606,
  author       = {{Löken, Nils}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas}}},
  year         = {{2012}},
}

