@misc{2900,
  author       = {{Brauer, Sascha}},
  title        = {{{A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures}}},
  year         = {{2014}},
}

@misc{414,
  author       = {{Jochheim, Janek}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Hiding software components using functional encryption}}},
  year         = {{2014}},
}

@misc{416,
  author       = {{Bemmann, Pascal}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Group Signature Schemes with Strong Exculpability}}},
  year         = {{2014}},
}

@misc{421,
  author       = {{Lippert, Jan}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Fujisaki-Okamoto Transformation}}},
  year         = {{2014}},
}

@misc{2868,
  author       = {{Laudemann, Stefan}},
  title        = {{{Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten}}},
  year         = {{2013}},
}

@misc{2869,
  author       = {{Leder, Lennart}},
  title        = {{{Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken}}},
  year         = {{2013}},
}

@phdthesis{2909,
  author       = {{Kuntze, Daniel}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Practical algorithms for clustering and modeling large data sets - Analysis and improvements}}},
  year         = {{2013}},
}

@misc{471,
  author       = {{Tezer, Alina}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen}}},
  year         = {{2013}},
}

@misc{486,
  author       = {{Otte, Oliver}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Seitenkanalresistenz paarungsbasierter Kryptographie}}},
  year         = {{2013}},
}

@misc{553,
  author       = {{Kohn, Kathlén}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise}}},
  year         = {{2013}},
}

@misc{606,
  author       = {{Löken, Nils}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas}}},
  year         = {{2012}},
}

@misc{607,
  author       = {{Haarhoff, Thomas}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2}}},
  year         = {{2012}},
}

@misc{629,
  author       = {{Schleiter, Patrick}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Attribute-basierte Verschlüsselung}}},
  year         = {{2012}},
}

@misc{2902,
  author       = {{Märtens, Marcus}},
  title        = {{{The Monotone Complexity of Computing k-Clique on Random Graphs}}},
  year         = {{2011}},
}

@misc{659,
  author       = {{Liske, Gennadij}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Fault attacks in pairing-based cryptography}}},
  year         = {{2011}},
}

@phdthesis{2910,
  author       = {{ Naewe, Stefanie}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Algorithms for lattice problems with respect to general norms}}},
  year         = {{2011}},
}

@misc{2880,
  author       = {{Schröer, Carsten}},
  title        = {{{Hierarchisches Clustering mit minimalen Cluster-Durchmessern}}},
  year         = {{2009}},
}

@misc{2904,
  author       = {{Scholz, Christoph}},
  title        = {{{Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen}}},
  year         = {{2009}},
}

@phdthesis{2911,
  author       = {{Ackermann, Marcel Rudolf}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Algorithms for the Bregman k-Median Problem}}},
  year         = {{2009}},
}

@phdthesis{2912,
  author       = {{Krummel, Volker}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Tamper Resistance of AES -- Models, Attacks and Countermeasures}}},
  year         = {{2007}},
}

