[{"title":"A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures","date_updated":"2022-01-06T06:58:44Z","date_created":"2018-05-25T09:45:38Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"id":"13291","full_name":"Brauer, Sascha","last_name":"Brauer","first_name":"Sascha"}],"year":"2014","citation":{"short":"S. Brauer, A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures, 2014.","mla":"Brauer, Sascha. <i>A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures</i>. 2014.","bibtex":"@book{Brauer_2014, title={A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures}, author={Brauer, Sascha}, year={2014} }","apa":"Brauer, S. (2014). <i>A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures</i>.","ieee":"S. Brauer, <i>A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures</i>. 2014.","chicago":"Brauer, Sascha. <i>A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures</i>, 2014.","ama":"Brauer S. <i>A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures</i>.; 2014."},"has_accepted_license":"1","ddc":["000"],"file_date_updated":"2018-05-25T09:45:33Z","_id":"2900","user_id":"25078","department":[{"_id":"64"}],"file":[{"date_updated":"2018-05-25T09:45:33Z","creator":"feidens","date_created":"2018-05-25T09:45:33Z","file_size":971935,"file_id":"2901","file_name":"2014_Brauer_AProbabilisticExpectationMaximizationAlgorithmForMultivariateLaplacianMixtures.pdf","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","type":"mastersthesis"},{"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:00:23Z","date_created":"2017-10-17T12:42:12Z","author":[{"first_name":"Janek","full_name":"Jochheim, Janek","last_name":"Jochheim"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"title":"Hiding software components using functional encryption","year":"2014","citation":{"chicago":"Jochheim, Janek. <i>Hiding Software Components Using Functional Encryption</i>. Universität Paderborn, 2014.","ieee":"J. Jochheim, <i>Hiding software components using functional encryption</i>. Universität Paderborn, 2014.","ama":"Jochheim J. <i>Hiding Software Components Using Functional Encryption</i>. Universität Paderborn; 2014.","apa":"Jochheim, J. (2014). <i>Hiding software components using functional encryption</i>. Universität Paderborn.","mla":"Jochheim, Janek. <i>Hiding Software Components Using Functional Encryption</i>. Universität Paderborn, 2014.","bibtex":"@book{Jochheim_2014, title={Hiding software components using functional encryption}, publisher={Universität Paderborn}, author={Jochheim, Janek}, year={2014} }","short":"J. Jochheim, Hiding Software Components Using Functional Encryption, Universität Paderborn, 2014."},"_id":"414","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"43","name":"Securing the Financial Cloud"}],"department":[{"_id":"64"}],"user_id":"25078","type":"mastersthesis","status":"public"},{"status":"public","type":"bachelorsthesis","user_id":"25078","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"416","citation":{"chicago":"Bemmann, Pascal. <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn, 2014.","ieee":"P. Bemmann, <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn, 2014.","ama":"Bemmann P. <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn; 2014.","short":"P. Bemmann, Group Signature Schemes with Strong Exculpability, Universität Paderborn, 2014.","bibtex":"@book{Bemmann_2014, title={Group Signature Schemes with Strong Exculpability}, publisher={Universität Paderborn}, author={Bemmann, Pascal}, year={2014} }","mla":"Bemmann, Pascal. <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn, 2014.","apa":"Bemmann, P. (2014). <i>Group Signature Schemes with Strong Exculpability</i>. Universität Paderborn."},"year":"2014","title":"Group Signature Schemes with Strong Exculpability","date_created":"2017-10-17T12:42:13Z","author":[{"last_name":"Bemmann","full_name":"Bemmann, Pascal","id":"32571","first_name":"Pascal"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:00:26Z"},{"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"author":[{"first_name":"Jan","full_name":"Lippert, Jan","last_name":"Lippert"}],"date_created":"2017-10-17T12:42:14Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:00:36Z","title":"Fujisaki-Okamoto Transformation","citation":{"apa":"Lippert, J. (2014). <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn.","mla":"Lippert, Jan. <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn, 2014.","short":"J. Lippert, Fujisaki-Okamoto Transformation, Universität Paderborn, 2014.","bibtex":"@book{Lippert_2014, title={Fujisaki-Okamoto Transformation}, publisher={Universität Paderborn}, author={Lippert, Jan}, year={2014} }","ieee":"J. Lippert, <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn, 2014.","chicago":"Lippert, Jan. <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn, 2014.","ama":"Lippert J. <i>Fujisaki-Okamoto Transformation</i>. Universität Paderborn; 2014."},"year":"2014","user_id":"25078","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"Securing the Financial Cloud","_id":"43"}],"_id":"421","type":"bachelorsthesis","status":"public"},{"citation":{"chicago":"Laudemann, Stefan. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>, 2013.","ieee":"S. Laudemann, <i>Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten</i>. 2013.","ama":"Laudemann S. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>.; 2013.","apa":"Laudemann, S. (2013). <i>Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten</i>.","mla":"Laudemann, Stefan. <i>Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten</i>. 2013.","bibtex":"@book{Laudemann_2013, title={Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten}, author={Laudemann, Stefan}, year={2013} }","short":"S. Laudemann, Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten, 2013."},"year":"2013","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"author":[{"first_name":"Stefan","full_name":"Laudemann, Stefan","last_name":"Laudemann"}],"date_created":"2018-05-24T13:16:41Z","date_updated":"2022-01-06T06:58:17Z","title":"Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten","type":"bachelorsthesis","status":"public","department":[{"_id":"64"}],"user_id":"25078","_id":"2868"},{"title":"Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken","date_updated":"2022-01-06T06:58:17Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2018-05-24T13:17:53Z","author":[{"first_name":"Lennart","last_name":"Leder","full_name":"Leder, Lennart"}],"year":"2013","citation":{"chicago":"Leder, Lennart. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken</i>, 2013.","ieee":"L. Leder, <i>Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken</i>. 2013.","ama":"Leder L. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken</i>.; 2013.","mla":"Leder, Lennart. <i>Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken</i>. 2013.","short":"L. Leder, Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken, 2013.","bibtex":"@book{Leder_2013, title={Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken}, author={Leder, Lennart}, year={2013} }","apa":"Leder, L. (2013). <i>Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken</i>."},"_id":"2869","user_id":"25078","department":[{"_id":"64"}],"status":"public","type":"bachelorsthesis"},{"year":"2013","citation":{"ama":"Kuntze D. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn; 2013.","ieee":"D. Kuntze, <i>Practical algorithms for clustering and modeling large data sets - Analysis and improvements</i>. Universität Paderborn, 2013.","chicago":"Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.","short":"D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements, Universität Paderborn, 2013.","bibtex":"@book{Kuntze_2013, title={Practical algorithms for clustering and modeling large data sets - Analysis and improvements}, publisher={Universität Paderborn}, author={Kuntze, Daniel}, year={2013} }","mla":"Kuntze, Daniel. <i>Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements</i>. Universität Paderborn, 2013.","apa":"Kuntze, D. (2013). <i>Practical algorithms for clustering and modeling large data sets - Analysis and improvements</i>. Universität Paderborn."},"title":"Practical algorithms for clustering and modeling large data sets - Analysis and improvements","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12721"}],"date_updated":"2022-01-06T06:58:46Z","publisher":"Universität Paderborn","author":[{"last_name":"Kuntze","full_name":"Kuntze, Daniel","first_name":"Daniel"}],"date_created":"2018-05-25T10:07:42Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"status":"public","type":"dissertation","_id":"2909","department":[{"_id":"64"}],"user_id":"25078"},{"date_updated":"2022-01-06T07:01:19Z","publisher":"Universität Paderborn","author":[{"last_name":"Tezer","full_name":"Tezer, Alina","first_name":"Alina"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_created":"2017-10-17T12:42:23Z","title":"Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen","year":"2013","citation":{"ama":"Tezer A. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn; 2013.","ieee":"A. Tezer, <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.","chicago":"Tezer, Alina. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.","bibtex":"@book{Tezer_2013, title={Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen}, publisher={Universität Paderborn}, author={Tezer, Alina}, year={2013} }","short":"A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013.","mla":"Tezer, Alina. <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn, 2013.","apa":"Tezer, A. (2013). <i>Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen</i>. Universität Paderborn."},"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"43","name":"Securing the Financial Cloud"}],"_id":"471","user_id":"477","department":[{"_id":"64"}],"language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public"},{"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:27Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_created":"2017-10-17T12:42:27Z","author":[{"first_name":"Oliver","full_name":"Otte, Oliver","last_name":"Otte"}],"title":"Seitenkanalresistenz paarungsbasierter Kryptographie","year":"2013","citation":{"ama":"Otte O. <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn; 2013.","chicago":"Otte, Oliver. <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn, 2013.","ieee":"O. Otte, <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn, 2013.","bibtex":"@book{Otte_2013, title={Seitenkanalresistenz paarungsbasierter Kryptographie}, publisher={Universität Paderborn}, author={Otte, Oliver}, year={2013} }","short":"O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie, Universität Paderborn, 2013.","mla":"Otte, Oliver. <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn, 2013.","apa":"Otte, O. (2013). <i>Seitenkanalresistenz paarungsbasierter Kryptographie</i>. Universität Paderborn."},"_id":"486","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"43","name":"Securing the Financial Cloud"}],"department":[{"_id":"64"}],"user_id":"477","language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public"},{"language":[{"iso":"ger"}],"_id":"553","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}],"department":[{"_id":"64"}],"user_id":"477","status":"public","type":"bachelorsthesis","title":"Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:57Z","date_created":"2017-10-17T12:42:40Z","author":[{"first_name":"Kathlén","full_name":"Kohn, Kathlén","last_name":"Kohn"}],"supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"year":"2013","citation":{"apa":"Kohn, K. (2013). <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn.","mla":"Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.","bibtex":"@book{Kohn_2013, title={Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise}, publisher={Universität Paderborn}, author={Kohn, Kathlén}, year={2013} }","short":"K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.","ama":"Kohn K. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn; 2013.","ieee":"K. Kohn, <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.","chicago":"Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013."}},{"citation":{"short":"N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas, Universität Paderborn, 2012.","bibtex":"@book{Löken_2012, title={Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas}, publisher={Universität Paderborn}, author={Löken, Nils}, year={2012} }","mla":"Löken, Nils. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn, 2012.","apa":"Löken, N. (2012). <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn.","ieee":"N. Löken, <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn, 2012.","chicago":"Löken, Nils. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn, 2012.","ama":"Löken N. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn; 2012."},"year":"2012","date_created":"2017-10-17T12:42:50Z","author":[{"id":"13703","full_name":"Löken, Nils","last_name":"Löken","first_name":"Nils"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:51Z","title":"Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas","type":"bachelorsthesis","status":"public","department":[{"_id":"64"}],"user_id":"13703","_id":"606","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"language":[{"iso":"ger"}]},{"_id":"607","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"64"}],"user_id":"477","language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public","date_updated":"2022-01-06T07:02:51Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:42:50Z","author":[{"first_name":"Thomas","full_name":"Haarhoff, Thomas","last_name":"Haarhoff"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"title":"Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2","year":"2012","citation":{"apa":"Haarhoff, T. (2012). <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn.","mla":"Haarhoff, Thomas. <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn, 2012.","bibtex":"@book{Haarhoff_2012, title={Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2}, publisher={Universität Paderborn}, author={Haarhoff, Thomas}, year={2012} }","short":"T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2, Universität Paderborn, 2012.","ama":"Haarhoff T. <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn; 2012.","ieee":"T. Haarhoff, <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn, 2012.","chicago":"Haarhoff, Thomas. <i>Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2</i>. Universität Paderborn, 2012."}},{"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:03:00Z","author":[{"first_name":"Patrick","last_name":"Schleiter","full_name":"Schleiter, Patrick"}],"supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2017-10-17T12:42:54Z","title":"Attribute-basierte Verschlüsselung","year":"2012","citation":{"chicago":"Schleiter, Patrick. <i>Attribute-basierte Verschlüsselung</i>. Universität Paderborn, 2012.","ieee":"P. Schleiter, <i>Attribute-basierte Verschlüsselung</i>. Universität Paderborn, 2012.","ama":"Schleiter P. <i>Attribute-basierte Verschlüsselung</i>. Universität Paderborn; 2012.","short":"P. Schleiter, Attribute-basierte Verschlüsselung, Universität Paderborn, 2012.","bibtex":"@book{Schleiter_2012, title={Attribute-basierte Verschlüsselung}, publisher={Universität Paderborn}, author={Schleiter, Patrick}, year={2012} }","mla":"Schleiter, Patrick. <i>Attribute-basierte Verschlüsselung</i>. Universität Paderborn, 2012.","apa":"Schleiter, P. (2012). <i>Attribute-basierte Verschlüsselung</i>. Universität Paderborn."},"_id":"629","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}],"department":[{"_id":"64"}],"user_id":"477","language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public"},{"status":"public","type":"mastersthesis","user_id":"25078","department":[{"_id":"64"}],"_id":"2902","citation":{"short":"M. Märtens, The Monotone Complexity of Computing K-Clique on Random Graphs, 2011.","bibtex":"@book{Märtens_2011, title={The Monotone Complexity of Computing k-Clique on Random Graphs}, author={Märtens, Marcus}, year={2011} }","mla":"Märtens, Marcus. <i>The Monotone Complexity of Computing K-Clique on Random Graphs</i>. 2011.","apa":"Märtens, M. (2011). <i>The Monotone Complexity of Computing k-Clique on Random Graphs</i>.","chicago":"Märtens, Marcus. <i>The Monotone Complexity of Computing K-Clique on Random Graphs</i>, 2011.","ieee":"M. Märtens, <i>The Monotone Complexity of Computing k-Clique on Random Graphs</i>. 2011.","ama":"Märtens M. <i>The Monotone Complexity of Computing K-Clique on Random Graphs</i>.; 2011."},"year":"2011","title":"The Monotone Complexity of Computing k-Clique on Random Graphs","date_created":"2018-05-25T09:46:27Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"author":[{"first_name":"Marcus","last_name":"Märtens","full_name":"Märtens, Marcus"}],"date_updated":"2022-01-06T06:58:44Z"},{"type":"mastersthesis","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-14T13:47:44Z","creator":"florida","date_created":"2018-03-14T13:47:44Z","file_size":1795920,"file_id":"1218","access_level":"closed","file_name":"659-MA_Fault_attacks_in_pairing-based_cryptography_01.pdf"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"43","name":"Securing the Financial Cloud"}],"_id":"659","user_id":"25078","department":[{"_id":"64"}],"ddc":["040"],"file_date_updated":"2018-03-14T13:47:44Z","has_accepted_license":"1","year":"2011","citation":{"apa":"Liske, G. (2011). <i>Fault attacks in pairing-based cryptography</i>. Universität Paderborn.","mla":"Liske, Gennadij. <i>Fault Attacks in Pairing-Based Cryptography</i>. Universität Paderborn, 2011.","short":"G. Liske, Fault Attacks in Pairing-Based Cryptography, Universität Paderborn, 2011.","bibtex":"@book{Liske_2011, title={Fault attacks in pairing-based cryptography}, publisher={Universität Paderborn}, author={Liske, Gennadij}, year={2011} }","chicago":"Liske, Gennadij. <i>Fault Attacks in Pairing-Based Cryptography</i>. Universität Paderborn, 2011.","ieee":"G. Liske, <i>Fault attacks in pairing-based cryptography</i>. Universität Paderborn, 2011.","ama":"Liske G. <i>Fault Attacks in Pairing-Based Cryptography</i>. Universität Paderborn; 2011."},"date_updated":"2022-01-06T07:03:13Z","publisher":"Universität Paderborn","author":[{"first_name":"Gennadij","full_name":"Liske, Gennadij","last_name":"Liske"}],"date_created":"2017-10-17T12:43:00Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"title":"Fault attacks in pairing-based cryptography"},{"status":"public","type":"dissertation","language":[{"iso":"eng"}],"_id":"2910","user_id":"49063","department":[{"_id":"64"}],"year":"2011","citation":{"apa":"Naewe, S. (2011). <i>Algorithms for lattice problems with respect to general norms</i>. Universität Paderborn.","bibtex":"@book{ Naewe_2011, title={Algorithms for lattice problems with respect to general norms}, publisher={Universität Paderborn}, author={ Naewe, Stefanie}, year={2011} }","short":"S.  Naewe, Algorithms for Lattice Problems with Respect to General Norms, Universität Paderborn, 2011.","mla":"Naewe, Stefanie. <i>Algorithms for Lattice Problems with Respect to General Norms</i>. Universität Paderborn, 2011.","ieee":"S.  Naewe, <i>Algorithms for lattice problems with respect to general norms</i>. Universität Paderborn, 2011.","chicago":"Naewe, Stefanie. <i>Algorithms for Lattice Problems with Respect to General Norms</i>. Universität Paderborn, 2011.","ama":"Naewe S. <i>Algorithms for Lattice Problems with Respect to General Norms</i>. Universität Paderborn; 2011."},"publication_status":"published","title":"Algorithms for lattice problems with respect to general norms","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-8047"}],"date_updated":"2024-08-08T12:17:02Z","publisher":"Universität Paderborn","author":[{"id":"1971","full_name":" Naewe, Stefanie","last_name":" Naewe","first_name":"Stefanie"}],"date_created":"2018-05-25T10:08:44Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}]},{"title":"Hierarchisches Clustering mit minimalen Cluster-Durchmessern","date_updated":"2022-01-06T06:58:25Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"full_name":"Schröer, Carsten","last_name":"Schröer","first_name":"Carsten"}],"date_created":"2018-05-25T09:07:25Z","year":"2009","citation":{"short":"C. Schröer, Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern, 2009.","bibtex":"@book{Schröer_2009, title={Hierarchisches Clustering mit minimalen Cluster-Durchmessern}, author={Schröer, Carsten}, year={2009} }","mla":"Schröer, Carsten. <i>Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern</i>. 2009.","apa":"Schröer, C. (2009). <i>Hierarchisches Clustering mit minimalen Cluster-Durchmessern</i>.","ieee":"C. Schröer, <i>Hierarchisches Clustering mit minimalen Cluster-Durchmessern</i>. 2009.","chicago":"Schröer, Carsten. <i>Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern</i>, 2009.","ama":"Schröer C. <i>Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern</i>.; 2009."},"has_accepted_license":"1","ddc":["000"],"file_date_updated":"2018-05-25T09:07:18Z","_id":"2880","department":[{"_id":"64"}],"user_id":"25078","status":"public","file":[{"file_size":626531,"access_level":"closed","file_id":"2881","file_name":"2009_Schroeer_HierarchischesDurchmesserClustering.pdf","date_updated":"2018-05-25T09:07:18Z","creator":"feidens","date_created":"2018-05-25T09:07:18Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"type":"bachelorsthesis"},{"status":"public","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"feidens","date_created":"2018-05-25T09:48:10Z","date_updated":"2018-05-25T09:48:10Z","access_level":"closed","file_name":"2009_Scholz_DieSchwierigkeitDesKMedianClusteringsFuerBregmanDivergenzen.pdf","file_id":"2905","file_size":844164}],"type":"mastersthesis","ddc":["000"],"file_date_updated":"2018-05-25T09:48:10Z","_id":"2904","department":[{"_id":"64"}],"user_id":"25078","year":"2009","citation":{"ama":"Scholz C. <i>Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen</i>.; 2009.","ieee":"C. Scholz, <i>Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen</i>. 2009.","chicago":"Scholz, Christoph. <i>Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen</i>, 2009.","apa":"Scholz, C. (2009). <i>Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen</i>.","mla":"Scholz, Christoph. <i>Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen</i>. 2009.","bibtex":"@book{Scholz_2009, title={Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen}, author={Scholz, Christoph}, year={2009} }","short":"C. Scholz, Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen, 2009."},"has_accepted_license":"1","title":"Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen","date_updated":"2022-01-06T06:58:44Z","date_created":"2018-05-25T09:48:17Z","author":[{"full_name":"Scholz, Christoph","last_name":"Scholz","first_name":"Christoph"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}]},{"type":"dissertation","status":"public","department":[{"_id":"64"}],"user_id":"25078","_id":"2911","citation":{"apa":"Ackermann, M. R. (2009). <i>Algorithms for the Bregman k-Median Problem</i>. Universität Paderborn.","mla":"Ackermann, Marcel Rudolf. <i>Algorithms for the Bregman K-Median Problem</i>. Universität Paderborn, 2009.","bibtex":"@book{Ackermann_2009, title={Algorithms for the Bregman k-Median Problem}, publisher={Universität Paderborn}, author={Ackermann, Marcel Rudolf}, year={2009} }","short":"M.R. Ackermann, Algorithms for the Bregman K-Median Problem, Universität Paderborn, 2009.","ama":"Ackermann MR. <i>Algorithms for the Bregman K-Median Problem</i>. Universität Paderborn; 2009.","chicago":"Ackermann, Marcel Rudolf. <i>Algorithms for the Bregman K-Median Problem</i>. Universität Paderborn, 2009.","ieee":"M. R. Ackermann, <i>Algorithms for the Bregman k-Median Problem</i>. Universität Paderborn, 2009."},"year":"2009","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2018-05-25T10:48:51Z","author":[{"first_name":"Marcel Rudolf","full_name":"Ackermann, Marcel Rudolf","last_name":"Ackermann"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:46Z","main_file_link":[{"url":"http://digital.ub.uni-paderborn.de/hs/content/titleinfo/1561"}],"title":"Algorithms for the Bregman k-Median Problem"},{"date_updated":"2022-01-06T06:58:46Z","publisher":"Universität Paderborn","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"author":[{"first_name":"Volker","last_name":"Krummel","full_name":"Krummel, Volker"}],"date_created":"2018-05-25T10:49:53Z","title":"Tamper Resistance of AES -- Models, Attacks and Countermeasures","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466-20080110018"}],"year":"2007","citation":{"apa":"Krummel, V. (2007). <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn.","mla":"Krummel, Volker. <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn, 2007.","bibtex":"@book{Krummel_2007, title={Tamper Resistance of AES -- Models, Attacks and Countermeasures}, publisher={Universität Paderborn}, author={Krummel, Volker}, year={2007} }","short":"V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures, Universität Paderborn, 2007.","ama":"Krummel V. <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn; 2007.","ieee":"V. Krummel, <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn, 2007.","chicago":"Krummel, Volker. <i>Tamper Resistance of AES -- Models, Attacks and Countermeasures</i>. Universität Paderborn, 2007."},"_id":"2912","user_id":"25078","department":[{"_id":"64"}],"type":"dissertation","status":"public"}]
