@misc{300,
  author       = {{Neumann, Conrad}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets}}},
  year         = {{2015}},
}

@misc{301,
  author       = {{Bobolz, Jan}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Efficient Verifier-Local Revocation for Anonymous Credentials}}},
  year         = {{2015}},
}

@misc{302,
  author       = {{Stroh, Christian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Efficient Attributes for Pairing-Based Anonymous Credentials}}},
  year         = {{2015}},
}

@phdthesis{304,
  author       = {{Koutsopoulos, Andreas}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Dynamics and Efficiency in Topological Self-Stabilization}}},
  year         = {{2015}},
}

@phdthesis{305,
  author       = {{Kniesburges, Sebastian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Distributed Data Structures and the Power of topological Self-Stabilization}}},
  year         = {{2015}},
}

@misc{306,
  author       = {{Kunisch, Christina}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Diffusion of Innovations in Social Networks}}},
  year         = {{2015}},
}

@misc{308,
  author       = {{Reimann, Alina}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Die Wirksamkeit von Zertifikaten als Qualitätssignal}}},
  year         = {{2015}},
}

@misc{309,
  author       = {{Topal, Barlas}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen}}},
  year         = {{2015}},
}

@misc{310,
  author       = {{Bruns, Melanie}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Design of an Evaluation Strategy for Fuzzy Service Matching}}},
  year         = {{2015}},
}

@misc{312,
  author       = {{Schleiter, Patrick}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Constructions of Fully Secure Predicate Encryption Schemes}}},
  year         = {{2015}},
}

@article{3120,
  author       = {{Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph}},
  journal      = {{J. Cryptology}},
  number       = {{1}},
  pages        = {{176----208}},
  title        = {{{Confined Guessing: New Signatures From Standard Assumptions}}},
  doi          = {{10.1007/s00145-014-9183-z}},
  year         = {{2015}},
}

@inproceedings{3121,
  author       = {{Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}},
  booktitle    = {{Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}},
  pages        = {{1185----1196}},
  title        = {{{On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}}},
  doi          = {{10.1145/2810103.2813657}},
  year         = {{2015}},
}

@inproceedings{3122,
  author       = {{Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}},
  booktitle    = {{Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}},
  pages        = {{407----425}},
  title        = {{{Practical Invalid Curve Attacks on TLS-ECDH}}},
  doi          = {{10.1007/978-3-319-24174-6_21}},
  year         = {{2015}},
}

@inproceedings{3123,
  author       = {{Heuer, Felix and Jager, Tibor and Kiltz, Eike and Schäge, Sven}},
  booktitle    = {{Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}},
  pages        = {{27----51}},
  title        = {{{On the Selective Opening Security of Practical Public-Key Encryption Schemes}}},
  doi          = {{10.1007/978-3-662-46447-2_2}},
  year         = {{2015}},
}

@inproceedings{3124,
  author       = {{Bergsma, Florian and Jager, Tibor and Schwenk, Jörg}},
  booktitle    = {{Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}},
  pages        = {{477----494}},
  title        = {{{One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}}},
  doi          = {{10.1007/978-3-662-46447-2_21}},
  year         = {{2015}},
}

@inproceedings{3125,
  author       = {{Jager, Tibor}},
  booktitle    = {{Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}},
  pages        = {{121----143}},
  title        = {{{Verifiable Random Functions from Weaker Assumptions}}},
  doi          = {{10.1007/978-3-662-46497-7_5}},
  year         = {{2015}},
}

@inproceedings{3126,
  author       = {{Bader, Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong}},
  booktitle    = {{Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}},
  pages        = {{629----658}},
  title        = {{{Tightly-Secure Authenticated Key Exchange}}},
  doi          = {{10.1007/978-3-662-46494-6_26}},
  year         = {{2015}},
}

@inproceedings{313,
  abstract     = {{Nowadays, many service providers offer software components in the form of Software as a Service. Requesters that want to discover those services in order to use or to integrate them, need to find out which service satisfies their requirements best. For this purpose, service matching approaches determine how well the specifications of provided services satisfy their requirements (including structural, behavioral, and non-functional requirements). In this paper, we describe the tool-suite MatchBox that allows the integration of existing service matchers and their combination as part of flexibly configurable matching processes. Taking requirements and service specifications as an input, MatchBox is able to execute such matching processes and deliver rich matching results. In contrast to related tools, MatchBox allows users to take into account many different kinds of requirements, while it also provides the flexibility to control the matching process in many different ways. }},
  author       = {{Börding, Paul and Bruns, Melanie and Platenius, Marie Christin}},
  booktitle    = {{10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15)}},
  pages        = {{974----977}},
  title        = {{{Comprehensive Service Matching with MatchBox}}},
  doi          = {{10.1145/2786805.2803181}},
  year         = {{2015}},
}

@techreport{314,
  abstract     = {{On an intermediate goods market we allow for vertical and horizontal product differentiation and analyze the influence of simultaneous competition for resources and customers on the market outcome. Asymmetries between intermediaries cannot arise just from distinct product qualities, but also from different production technologies. The intermediaries face either price or quantity competition on the output market and a monopolistic input supplier on the input market. We find that there exist quality and productivity differences such that for quantity competition only one intermediary is willing to procure inputs from the input supplier, while for price competition both intermediaries are willing to purchase inputs. Considering product innovation for symmetric productivities we derive equilibrium conditions on the investment costs and compare price and quantity competition. It turns out that on the one hand there exist product qualities and degrees of horizontal product differentiation for complements such that asymmetric investment equilibria fail to exist. On the other hand we find that there also exist product qualities and degrees of horizontal product differentiation for substitutes such that existence can be guaranteed if the investment costs are chosen accordingly.}},
  author       = {{Brangewitz, Sonja and Manegold, Jochen}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Competition and Product Innovation of Intermediaries in a Differentiated Duopoly}}},
  year         = {{2015}},
}

@inproceedings{315,
  abstract     = {{In this paper, we introduce an approach for combining embedded systems with Service-oriented Computing techniques based on a concrete application scenario from the robotics domain. Our proposed Service-oriented Architecture allows for incorporating computational expensive functionality as services into a distributed computing environment. Furthermore, our framework facilitates a seamless integration of embedded systems such as robots as service providers into the computing environment. The entire communication is based on so-called recipes, which can be interpreted as autonomous messages that contain all necessary information for executing compositions of services.}},
  author       = {{Jungmann, Alexander and Jatzkowski, Jan and Kleinjohann, Bernd}},
  booktitle    = {{Proceedings of the 5th IFIP International Embedded Systems Symposium}},
  title        = {{{Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study}}},
  year         = {{2015}},
}

