[{"type":"bachelorsthesis","status":"public","user_id":"477","_id":"300","project":[{"_id":"1","name":"SFB 901"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"_id":"3","name":"SFB 901 - Project Area B"}],"language":[{"iso":"ger"}],"citation":{"ieee":"C. Neumann, <i>Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets</i>. Universität Paderborn, 2015.","chicago":"Neumann, Conrad. <i>Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets</i>. Universität Paderborn, 2015.","ama":"Neumann C. <i>Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets</i>. Universität Paderborn; 2015.","bibtex":"@book{Neumann_2015, title={Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets}, publisher={Universität Paderborn}, author={Neumann, Conrad}, year={2015} }","mla":"Neumann, Conrad. <i>Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets</i>. Universität Paderborn, 2015.","short":"C. Neumann, Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets, Universität Paderborn, 2015.","apa":"Neumann, C. (2015). <i>Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets</i>. Universität Paderborn."},"year":"2015","author":[{"first_name":"Conrad","last_name":"Neumann","full_name":"Neumann, Conrad"}],"date_created":"2017-10-17T12:41:50Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:50Z","title":"Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets"},{"file_date_updated":"2018-07-20T09:54:22Z","ddc":["040"],"user_id":"27207","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"301","file":[{"file_size":1214027,"access_level":"open_access","file_name":"301-thesis_jbobolz_final_02.pdf","file_id":"1443","date_updated":"2018-07-20T09:54:22Z","creator":"florida","date_created":"2018-03-20T07:47:11Z","relation":"main_file","content_type":"application/pdf"}],"status":"public","urn":"3016","type":"mastersthesis","title":"Efficient Verifier-Local Revocation for Anonymous Credentials","author":[{"first_name":"Jan","full_name":"Bobolz, Jan","id":"27207","last_name":"Bobolz"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2017-10-17T12:41:50Z","date_updated":"2022-01-06T06:58:51Z","oa":"1","publisher":"Universität Paderborn","citation":{"short":"J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials, Universität Paderborn, 2015.","bibtex":"@book{Bobolz_2015, title={Efficient Verifier-Local Revocation for Anonymous Credentials}, publisher={Universität Paderborn}, author={Bobolz, Jan}, year={2015} }","mla":"Bobolz, Jan. <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>. Universität Paderborn, 2015.","apa":"Bobolz, J. (2015). <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>. Universität Paderborn.","ama":"Bobolz J. <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>. Universität Paderborn; 2015.","chicago":"Bobolz, Jan. <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>. Universität Paderborn, 2015.","ieee":"J. Bobolz, <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>. Universität Paderborn, 2015."},"year":"2015","has_accepted_license":"1"},{"title":"Efficient Attributes for Pairing-Based Anonymous Credentials","date_created":"2017-10-17T12:41:50Z","author":[{"last_name":"Stroh","full_name":"Stroh, Christian","first_name":"Christian"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"date_updated":"2022-01-06T06:58:51Z","publisher":"Universität Paderborn","citation":{"short":"C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität Paderborn, 2015.","mla":"Stroh, Christian. <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>. Universität Paderborn, 2015.","bibtex":"@book{Stroh_2015, title={Efficient Attributes for Pairing-Based Anonymous Credentials}, publisher={Universität Paderborn}, author={Stroh, Christian}, year={2015} }","apa":"Stroh, C. (2015). <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>. Universität Paderborn.","ama":"Stroh C. <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>. Universität Paderborn; 2015.","chicago":"Stroh, Christian. <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>. Universität Paderborn, 2015.","ieee":"C. Stroh, <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>. Universität Paderborn, 2015."},"year":"2015","user_id":"477","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"302","status":"public","type":"mastersthesis"},{"citation":{"ieee":"A. Koutsopoulos, <i>Dynamics and Efficiency in Topological Self-Stabilization</i>. Universität Paderborn, 2015.","chicago":"Koutsopoulos, Andreas. <i>Dynamics and Efficiency in Topological Self-Stabilization</i>. Universität Paderborn, 2015.","ama":"Koutsopoulos A. <i>Dynamics and Efficiency in Topological Self-Stabilization</i>. Universität Paderborn; 2015.","apa":"Koutsopoulos, A. (2015). <i>Dynamics and Efficiency in Topological Self-Stabilization</i>. Universität Paderborn.","short":"A. Koutsopoulos, Dynamics and Efficiency in Topological Self-Stabilization, Universität Paderborn, 2015.","mla":"Koutsopoulos, Andreas. <i>Dynamics and Efficiency in Topological Self-Stabilization</i>. Universität Paderborn, 2015.","bibtex":"@book{Koutsopoulos_2015, title={Dynamics and Efficiency in Topological Self-Stabilization}, publisher={Universität Paderborn}, author={Koutsopoulos, Andreas}, year={2015} }"},"year":"2015","has_accepted_license":"1","title":"Dynamics and Efficiency in Topological Self-Stabilization","author":[{"last_name":"Koutsopoulos","full_name":"Koutsopoulos, Andreas","first_name":"Andreas"}],"supervisor":[{"first_name":"Christian","id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler"}],"date_created":"2017-10-17T12:41:51Z","date_updated":"2022-01-06T06:58:53Z","publisher":"Universität Paderborn","file":[{"file_id":"1441","access_level":"closed","file_name":"304-Dissertation_-_Koutsopoulos.pdf","file_size":2275834,"creator":"florida","date_created":"2018-03-20T07:46:19Z","date_updated":"2018-03-20T07:46:19Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","type":"dissertation","file_date_updated":"2018-03-20T07:46:19Z","ddc":["040"],"user_id":"15504","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subproject A1"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"304"},{"title":"Distributed Data Structures and the Power of topological Self-Stabilization","author":[{"first_name":"Sebastian","last_name":"Kniesburges","full_name":"Kniesburges, Sebastian"}],"supervisor":[{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"}],"date_created":"2017-10-17T12:41:51Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:54Z","citation":{"ama":"Kniesburges S. <i>Distributed Data Structures and the Power of Topological Self-Stabilization</i>. Universität Paderborn; 2015.","chicago":"Kniesburges, Sebastian. <i>Distributed Data Structures and the Power of Topological Self-Stabilization</i>. Universität Paderborn, 2015.","ieee":"S. Kniesburges, <i>Distributed Data Structures and the Power of topological Self-Stabilization</i>. Universität Paderborn, 2015.","bibtex":"@book{Kniesburges_2015, title={Distributed Data Structures and the Power of topological Self-Stabilization}, publisher={Universität Paderborn}, author={Kniesburges, Sebastian}, year={2015} }","short":"S. Kniesburges, Distributed Data Structures and the Power of Topological Self-Stabilization, Universität Paderborn, 2015.","mla":"Kniesburges, Sebastian. <i>Distributed Data Structures and the Power of Topological Self-Stabilization</i>. Universität Paderborn, 2015.","apa":"Kniesburges, S. (2015). <i>Distributed Data Structures and the Power of topological Self-Stabilization</i>. Universität Paderborn."},"year":"2015","has_accepted_license":"1","file_date_updated":"2018-03-13T09:14:43Z","ddc":["040"],"user_id":"15504","department":[{"_id":"79"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject A1","_id":"5"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"305","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":1709094,"file_name":"305-Dissertation_-_Kniesburges.pdf","access_level":"closed","file_id":"1206","date_updated":"2018-03-13T09:14:43Z","date_created":"2018-03-13T09:14:43Z","creator":"florida"}],"status":"public","type":"dissertation"},{"department":[{"_id":"280"}],"user_id":"42447","_id":"306","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Project Area A","_id":"2"}],"status":"public","type":"bachelorsthesis","title":"Diffusion of Innovations in Social Networks","supervisor":[{"first_name":"Burkhard","last_name":"Hehenkamp","full_name":"Hehenkamp, Burkhard","id":"37339"}],"author":[{"first_name":"Christina","full_name":"Kunisch, Christina","last_name":"Kunisch"}],"date_created":"2017-10-17T12:41:51Z","date_updated":"2022-01-06T06:58:54Z","publisher":"Universität Paderborn","citation":{"apa":"Kunisch, C. (2015). <i>Diffusion of Innovations in Social Networks</i>. Universität Paderborn.","bibtex":"@book{Kunisch_2015, title={Diffusion of Innovations in Social Networks}, publisher={Universität Paderborn}, author={Kunisch, Christina}, year={2015} }","mla":"Kunisch, Christina. <i>Diffusion of Innovations in Social Networks</i>. Universität Paderborn, 2015.","short":"C. Kunisch, Diffusion of Innovations in Social Networks, Universität Paderborn, 2015.","ieee":"C. Kunisch, <i>Diffusion of Innovations in Social Networks</i>. Universität Paderborn, 2015.","chicago":"Kunisch, Christina. <i>Diffusion of Innovations in Social Networks</i>. Universität Paderborn, 2015.","ama":"Kunisch C. <i>Diffusion of Innovations in Social Networks</i>. Universität Paderborn; 2015."},"year":"2015"},{"title":"Die Wirksamkeit von Zertifikaten als Qualitätssignal","date_updated":"2022-01-06T06:58:55Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:52Z","author":[{"first_name":"Alina","full_name":"Reimann, Alina","last_name":"Reimann"}],"year":"2015","citation":{"bibtex":"@book{Reimann_2015, title={Die Wirksamkeit von Zertifikaten als Qualitätssignal}, publisher={Universität Paderborn}, author={Reimann, Alina}, year={2015} }","short":"A. Reimann, Die Wirksamkeit von Zertifikaten als Qualitätssignal, Universität Paderborn, 2015.","mla":"Reimann, Alina. <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>. Universität Paderborn, 2015.","apa":"Reimann, A. (2015). <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>. Universität Paderborn.","ieee":"A. Reimann, <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>. Universität Paderborn, 2015.","chicago":"Reimann, Alina. <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>. Universität Paderborn, 2015.","ama":"Reimann A. <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>. Universität Paderborn; 2015."},"language":[{"iso":"ger"}],"_id":"308","project":[{"name":"SFB 901","_id":"1"},{"_id":"8","name":"SFB 901 - Subprojekt A4"},{"name":"SFB 901 - Project Area A","_id":"2"}],"user_id":"477","status":"public","type":"bachelorsthesis"},{"type":"mastersthesis","status":"public","user_id":"42447","department":[{"_id":"280"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"309","language":[{"iso":"ger"}],"citation":{"bibtex":"@book{Topal_2015, title={Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen}, publisher={Universität Paderborn}, author={Topal, Barlas}, year={2015} }","short":"B. Topal, Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen, Universität Paderborn, 2015.","mla":"Topal, Barlas. <i>Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen</i>. Universität Paderborn, 2015.","apa":"Topal, B. (2015). <i>Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen</i>. Universität Paderborn.","ama":"Topal B. <i>Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen</i>. Universität Paderborn; 2015.","chicago":"Topal, Barlas. <i>Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen</i>. Universität Paderborn, 2015.","ieee":"B. Topal, <i>Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen</i>. Universität Paderborn, 2015."},"year":"2015","date_created":"2017-10-17T12:41:52Z","author":[{"full_name":"Topal, Barlas","last_name":"Topal","first_name":"Barlas"}],"supervisor":[{"first_name":"Burkhard","last_name":"Hehenkamp","id":"37339","full_name":"Hehenkamp, Burkhard"}],"date_updated":"2022-01-06T06:58:55Z","publisher":"Universität Paderborn","title":"Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen"},{"project":[{"name":"SFB 901","_id":"1"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"310","user_id":"477","status":"public","type":"bachelorsthesis","title":"Design of an Evaluation Strategy for Fuzzy Service Matching","date_updated":"2022-01-06T06:58:55Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:52Z","author":[{"first_name":"Melanie","full_name":"Bruns, Melanie","last_name":"Bruns"}],"year":"2015","citation":{"ieee":"M. Bruns, <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>. Universität Paderborn, 2015.","chicago":"Bruns, Melanie. <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>. Universität Paderborn, 2015.","ama":"Bruns M. <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>. Universität Paderborn; 2015.","mla":"Bruns, Melanie. <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>. Universität Paderborn, 2015.","bibtex":"@book{Bruns_2015, title={Design of an Evaluation Strategy for Fuzzy Service Matching}, publisher={Universität Paderborn}, author={Bruns, Melanie}, year={2015} }","short":"M. Bruns, Design of an Evaluation Strategy for Fuzzy Service Matching, Universität Paderborn, 2015.","apa":"Bruns, M. (2015). <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>. Universität Paderborn."}},{"file_date_updated":"2018-03-20T07:44:55Z","ddc":["040"],"department":[{"_id":"64"}],"user_id":"477","_id":"312","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"status":"public","file":[{"file_size":721996,"file_id":"1439","access_level":"closed","file_name":"312-MA_2015_Schleiter_Constructions_of_fully_secure_PE_schemes_01.pdf","date_updated":"2018-03-20T07:44:55Z","date_created":"2018-03-20T07:44:55Z","creator":"florida","success":1,"relation":"main_file","content_type":"application/pdf"}],"type":"mastersthesis","title":"Constructions of Fully Secure Predicate Encryption Schemes","date_created":"2017-10-17T12:41:52Z","author":[{"first_name":"Patrick","full_name":"Schleiter, Patrick","last_name":"Schleiter"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_updated":"2022-01-06T06:58:57Z","publisher":"Universität Paderborn","citation":{"bibtex":"@book{Schleiter_2015, title={Constructions of Fully Secure Predicate Encryption Schemes}, publisher={Universität Paderborn}, author={Schleiter, Patrick}, year={2015} }","short":"P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes, Universität Paderborn, 2015.","mla":"Schleiter, Patrick. <i>Constructions of Fully Secure Predicate Encryption Schemes</i>. Universität Paderborn, 2015.","apa":"Schleiter, P. (2015). <i>Constructions of Fully Secure Predicate Encryption Schemes</i>. Universität Paderborn.","ama":"Schleiter P. <i>Constructions of Fully Secure Predicate Encryption Schemes</i>. Universität Paderborn; 2015.","ieee":"P. Schleiter, <i>Constructions of Fully Secure Predicate Encryption Schemes</i>. Universität Paderborn, 2015.","chicago":"Schleiter, Patrick. <i>Constructions of Fully Secure Predicate Encryption Schemes</i>. Universität Paderborn, 2015."},"year":"2015","has_accepted_license":"1"},{"_id":"3120","user_id":"38235","department":[{"_id":"558"}],"extern":"1","type":"journal_article","publication":"J. Cryptology","status":"public","date_updated":"2022-01-06T06:58:57Z","author":[{"first_name":"Florian","last_name":"Böhl","full_name":"Böhl, Florian"},{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"full_name":"Jager, Tibor","id":"64669","last_name":"Jager","first_name":"Tibor"},{"first_name":"Jessica","full_name":"Koch, Jessica","last_name":"Koch"},{"first_name":"Christoph","full_name":"Striecks, Christoph","last_name":"Striecks"}],"date_created":"2018-06-07T09:17:17Z","title":"Confined Guessing: New Signatures From Standard Assumptions","doi":"10.1007/s00145-014-9183-z","issue":"1","year":"2015","citation":{"mla":"Böhl, Florian, et al. “Confined Guessing: New Signatures From Standard Assumptions.” <i>J. Cryptology</i>, no. 1, 2015, pp. 176--208, doi:<a href=\"https://doi.org/10.1007/s00145-014-9183-z\">10.1007/s00145-014-9183-z</a>.","short":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, C. Striecks, J. Cryptology (2015) 176--208.","bibtex":"@article{Böhl_Hofheinz_Jager_Koch_Striecks_2015, title={Confined Guessing: New Signatures From Standard Assumptions}, DOI={<a href=\"https://doi.org/10.1007/s00145-014-9183-z\">10.1007/s00145-014-9183-z</a>}, number={1}, journal={J. Cryptology}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph}, year={2015}, pages={176--208} }","apa":"Böhl, F., Hofheinz, D., Jager, T., Koch, J., &#38; Striecks, C. (2015). Confined Guessing: New Signatures From Standard Assumptions. <i>J. Cryptology</i>, (1), 176--208. <a href=\"https://doi.org/10.1007/s00145-014-9183-z\">https://doi.org/10.1007/s00145-014-9183-z</a>","ama":"Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures From Standard Assumptions. <i>J Cryptology</i>. 2015;(1):176--208. doi:<a href=\"https://doi.org/10.1007/s00145-014-9183-z\">10.1007/s00145-014-9183-z</a>","chicago":"Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph Striecks. “Confined Guessing: New Signatures From Standard Assumptions.” <i>J. Cryptology</i>, no. 1 (2015): 176--208. <a href=\"https://doi.org/10.1007/s00145-014-9183-z\">https://doi.org/10.1007/s00145-014-9183-z</a>.","ieee":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, and C. Striecks, “Confined Guessing: New Signatures From Standard Assumptions,” <i>J. Cryptology</i>, no. 1, pp. 176--208, 2015."},"page":"176--208"},{"type":"conference","publication":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015","status":"public","_id":"3121","user_id":"38235","department":[{"_id":"558"}],"extern":"1","year":"2015","citation":{"ama":"Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In: <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>. ; 2015:1185--1196. doi:<a href=\"https://doi.org/10.1145/2810103.2813657\">10.1145/2810103.2813657</a>","ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption,” in <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>, 2015, pp. 1185--1196.","chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” In <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>, 1185--1196, 2015. <a href=\"https://doi.org/10.1145/2810103.2813657\">https://doi.org/10.1145/2810103.2813657</a>.","apa":"Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i> (pp. 1185--1196). <a href=\"https://doi.org/10.1145/2810103.2813657\">https://doi.org/10.1145/2810103.2813657</a>","bibtex":"@inproceedings{Jager_Schwenk_Somorovsky_2015, title={On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}, DOI={<a href=\"https://doi.org/10.1145/2810103.2813657\">10.1145/2810103.2813657</a>}, booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={1185--1196} }","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.","mla":"Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>, 2015, pp. 1185--1196, doi:<a href=\"https://doi.org/10.1145/2810103.2813657\">10.1145/2810103.2813657</a>."},"page":"1185--1196","date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:17:47Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"},{"first_name":"Juraj","full_name":"Somorovsky, Juraj","last_name":"Somorovsky"}],"title":"On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption","doi":"10.1145/2810103.2813657"},{"extern":"1","_id":"3122","department":[{"_id":"558"}],"user_id":"38235","status":"public","publication":"Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I","type":"conference","title":"Practical Invalid Curve Attacks on TLS-ECDH","doi":"10.1007/978-3-319-24174-6_21","date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:18:33Z","author":[{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"},{"first_name":"Juraj","last_name":"Somorovsky","full_name":"Somorovsky, Juraj"}],"year":"2015","page":"407--425","citation":{"chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>, 407--425, 2015. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>.","ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>, 2015, pp. 407--425.","ama":"Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>. ; 2015:407--425. doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>","apa":"Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i> (pp. 407--425). <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>","bibtex":"@inproceedings{Jager_Schwenk_Somorovsky_2015, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>}, booktitle={Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={407--425} }","mla":"Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>, 2015, pp. 407--425, doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>.","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425."}},{"extern":"1","_id":"3123","user_id":"38235","department":[{"_id":"558"}],"status":"public","type":"conference","publication":"Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings","title":"On the Selective Opening Security of Practical Public-Key Encryption Schemes","doi":"10.1007/978-3-662-46447-2_2","date_updated":"2022-01-06T06:58:57Z","author":[{"first_name":"Felix","last_name":"Heuer","full_name":"Heuer, Felix"},{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"Eike","last_name":"Kiltz","full_name":"Kiltz, Eike"},{"first_name":"Sven","full_name":"Schäge, Sven","last_name":"Schäge"}],"date_created":"2018-06-07T09:19:04Z","year":"2015","citation":{"ieee":"F. Heuer, T. Jager, E. Kiltz, and S. Schäge, “On the Selective Opening Security of Practical Public-Key Encryption Schemes,” in <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 27--51.","chicago":"Heuer, Felix, Tibor Jager, Eike Kiltz, and Sven Schäge. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 27--51, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">https://doi.org/10.1007/978-3-662-46447-2_2</a>.","ama":"Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of Practical Public-Key Encryption Schemes. In: <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>. ; 2015:27--51. doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">10.1007/978-3-662-46447-2_2</a>","mla":"Heuer, Felix, et al. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 27--51, doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">10.1007/978-3-662-46447-2_2</a>.","bibtex":"@inproceedings{Heuer_Jager_Kiltz_Schäge_2015, title={On the Selective Opening Security of Practical Public-Key Encryption Schemes}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">10.1007/978-3-662-46447-2_2</a>}, booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, author={Heuer, Felix and Jager, Tibor and Kiltz, Eike and Schäge, Sven}, year={2015}, pages={27--51} }","short":"F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.","apa":"Heuer, F., Jager, T., Kiltz, E., &#38; Schäge, S. (2015). On the Selective Opening Security of Practical Public-Key Encryption Schemes. In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i> (pp. 27--51). <a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">https://doi.org/10.1007/978-3-662-46447-2_2</a>"},"page":"27--51"},{"publication":"Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings","type":"conference","status":"public","_id":"3124","department":[{"_id":"558"}],"user_id":"38235","extern":"1","year":"2015","page":"477--494","citation":{"bibtex":"@inproceedings{Bergsma_Jager_Schwenk_2015, title={One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">10.1007/978-3-662-46447-2_21</a>}, booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, author={Bergsma, Florian and Jager, Tibor and Schwenk, Jörg}, year={2015}, pages={477--494} }","short":"F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.","mla":"Bergsma, Florian, et al. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 477--494, doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">10.1007/978-3-662-46447-2_21</a>.","apa":"Bergsma, F., Jager, T., &#38; Schwenk, J. (2015). One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i> (pp. 477--494). <a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">https://doi.org/10.1007/978-3-662-46447-2_21</a>","ieee":"F. Bergsma, T. Jager, and J. Schwenk, “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model,” in <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 477--494.","chicago":"Bergsma, Florian, Tibor Jager, and Jörg Schwenk. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 477--494, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">https://doi.org/10.1007/978-3-662-46447-2_21</a>.","ama":"Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In: <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>. ; 2015:477--494. doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">10.1007/978-3-662-46447-2_21</a>"},"date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:19:47Z","author":[{"full_name":"Bergsma, Florian","last_name":"Bergsma","first_name":"Florian"},{"last_name":"Jager","full_name":"Jager, Tibor","id":"64669","first_name":"Tibor"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"}],"title":"One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model","doi":"10.1007/978-3-662-46447-2_21"},{"page":"121--143","citation":{"ieee":"T. Jager, “Verifiable Random Functions from Weaker Assumptions,” in <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143.","chicago":"Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” In <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>, 121--143, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">https://doi.org/10.1007/978-3-662-46497-7_5</a>.","ama":"Jager T. Verifiable Random Functions from Weaker Assumptions. In: <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>. ; 2015:121--143. doi:<a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">10.1007/978-3-662-46497-7_5</a>","apa":"Jager, T. (2015). Verifiable Random Functions from Weaker Assumptions. In <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i> (pp. 121--143). <a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">https://doi.org/10.1007/978-3-662-46497-7_5</a>","short":"T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.","mla":"Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143, doi:<a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">10.1007/978-3-662-46497-7_5</a>.","bibtex":"@inproceedings{Jager_2015, title={Verifiable Random Functions from Weaker Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">10.1007/978-3-662-46497-7_5</a>}, booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, author={Jager, Tibor}, year={2015}, pages={121--143} }"},"year":"2015","doi":"10.1007/978-3-662-46497-7_5","title":"Verifiable Random Functions from Weaker Assumptions","date_created":"2018-06-07T09:20:19Z","author":[{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"}],"date_updated":"2022-01-06T06:58:57Z","status":"public","publication":"Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}","type":"conference","extern":"1","department":[{"_id":"558"}],"user_id":"38235","_id":"3125"},{"_id":"3126","department":[{"_id":"558"}],"user_id":"38235","extern":"1","publication":"Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I","type":"conference","status":"public","date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:20:48Z","author":[{"first_name":"Christoph","last_name":"Bader","full_name":"Bader, Christoph"},{"full_name":"Hofheinz, Dennis","last_name":"Hofheinz","first_name":"Dennis"},{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"first_name":"Eike","full_name":"Kiltz, Eike","last_name":"Kiltz"},{"first_name":"Yong","last_name":"Li","full_name":"Li, Yong"}],"title":"Tightly-Secure Authenticated Key Exchange","doi":"10.1007/978-3-662-46494-6_26","year":"2015","page":"629--658","citation":{"ama":"Bader C, Hofheinz D, Jager T, Kiltz E, Li Y. Tightly-Secure Authenticated Key Exchange. In: <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>. ; 2015:629--658. doi:<a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">10.1007/978-3-662-46494-6_26</a>","ieee":"C. Bader, D. Hofheinz, T. Jager, E. Kiltz, and Y. Li, “Tightly-Secure Authenticated Key Exchange,” in <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>, 2015, pp. 629--658.","chicago":"Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li. “Tightly-Secure Authenticated Key Exchange.” In <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>, 629--658, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">https://doi.org/10.1007/978-3-662-46494-6_26</a>.","bibtex":"@inproceedings{Bader_Hofheinz_Jager_Kiltz_Li_2015, title={Tightly-Secure Authenticated Key Exchange}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">10.1007/978-3-662-46494-6_26</a>}, booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}, author={Bader, Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong}, year={2015}, pages={629--658} }","short":"C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.","mla":"Bader, Christoph, et al. “Tightly-Secure Authenticated Key Exchange.” <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>, 2015, pp. 629--658, doi:<a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">10.1007/978-3-662-46494-6_26</a>.","apa":"Bader, C., Hofheinz, D., Jager, T., Kiltz, E., &#38; Li, Y. (2015). Tightly-Secure Authenticated Key Exchange. In <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i> (pp. 629--658). <a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">https://doi.org/10.1007/978-3-662-46494-6_26</a>"}},{"file":[{"date_updated":"2018-03-20T07:44:26Z","creator":"florida","date_created":"2018-03-20T07:44:26Z","file_size":875687,"access_level":"closed","file_id":"1438","file_name":"313-p974-boerding.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","abstract":[{"lang":"eng","text":"Nowadays, many service providers offer software components in the form of Software as a Service. Requesters that want to discover those services in order to use or to integrate them, need to find out which service satisfies their requirements best. For this purpose, service matching approaches determine how well the specifications of provided services satisfy their requirements (including structural, behavioral, and non-functional requirements). In this paper, we describe the tool-suite MatchBox that allows the integration of existing service matchers and their combination as part of flexibly configurable matching processes. Taking requirements and service specifications as an input, MatchBox is able to execute such matching processes and deliver rich matching results. In contrast to related tools, MatchBox allows users to take into account many different kinds of requirements, while it also provides the flexibility to control the matching process in many different ways. "}],"type":"conference","publication":"10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15)","file_date_updated":"2018-03-20T07:44:26Z","language":[{"iso":"eng"}],"ddc":["040"],"user_id":"477","department":[{"_id":"76"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"313","citation":{"apa":"Börding, P., Bruns, M., &#38; Platenius, M. C. (2015). Comprehensive Service Matching with MatchBox. In <i>10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)</i> (pp. 974--977). <a href=\"https://doi.org/10.1145/2786805.2803181\">https://doi.org/10.1145/2786805.2803181</a>","mla":"Börding, Paul, et al. “Comprehensive Service Matching with MatchBox.” <i>10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)</i>, 2015, pp. 974--977, doi:<a href=\"https://doi.org/10.1145/2786805.2803181\">10.1145/2786805.2803181</a>.","bibtex":"@inproceedings{Börding_Bruns_Platenius_2015, title={Comprehensive Service Matching with MatchBox}, DOI={<a href=\"https://doi.org/10.1145/2786805.2803181\">10.1145/2786805.2803181</a>}, booktitle={10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)}, author={Börding, Paul and Bruns, Melanie and Platenius, Marie Christin}, year={2015}, pages={974--977} }","short":"P. Börding, M. Bruns, M.C. Platenius, in: 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977.","ama":"Börding P, Bruns M, Platenius MC. Comprehensive Service Matching with MatchBox. In: <i>10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)</i>. ; 2015:974--977. doi:<a href=\"https://doi.org/10.1145/2786805.2803181\">10.1145/2786805.2803181</a>","ieee":"P. Börding, M. Bruns, and M. C. Platenius, “Comprehensive Service Matching with MatchBox,” in <i>10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)</i>, 2015, pp. 974--977.","chicago":"Börding, Paul, Melanie Bruns, and Marie Christin Platenius. “Comprehensive Service Matching with MatchBox.” In <i>10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)</i>, 974--977, 2015. <a href=\"https://doi.org/10.1145/2786805.2803181\">https://doi.org/10.1145/2786805.2803181</a>."},"page":"974--977","year":"2015","has_accepted_license":"1","doi":"10.1145/2786805.2803181","title":"Comprehensive Service Matching with MatchBox","author":[{"first_name":"Paul","last_name":"Börding","full_name":"Börding, Paul"},{"last_name":"Bruns","full_name":"Bruns, Melanie","first_name":"Melanie"},{"first_name":"Marie Christin","full_name":"Platenius, Marie Christin","last_name":"Platenius"}],"date_created":"2017-10-17T12:41:53Z","date_updated":"2022-01-06T06:58:58Z"},{"title":"Competition and Product Innovation of Intermediaries in a Differentiated Duopoly","date_created":"2017-10-17T12:41:53Z","author":[{"first_name":"Sonja","last_name":"Brangewitz","full_name":"Brangewitz, Sonja"},{"last_name":"Manegold","full_name":"Manegold, Jochen","first_name":"Jochen"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:58Z","citation":{"ama":"Brangewitz S, Manegold J. <i>Competition and Product Innovation of Intermediaries in a Differentiated Duopoly</i>. Universität Paderborn; 2015.","ieee":"S. Brangewitz and J. Manegold, <i>Competition and Product Innovation of Intermediaries in a Differentiated Duopoly</i>. Universität Paderborn, 2015.","chicago":"Brangewitz, Sonja, and Jochen Manegold. <i>Competition and Product Innovation of Intermediaries in a Differentiated Duopoly</i>. Universität Paderborn, 2015.","apa":"Brangewitz, S., &#38; Manegold, J. (2015). <i>Competition and Product Innovation of Intermediaries in a Differentiated Duopoly</i>. Universität Paderborn.","mla":"Brangewitz, Sonja, and Jochen Manegold. <i>Competition and Product Innovation of Intermediaries in a Differentiated Duopoly</i>. Universität Paderborn, 2015.","bibtex":"@book{Brangewitz_Manegold_2015, title={Competition and Product Innovation of Intermediaries in a Differentiated Duopoly}, publisher={Universität Paderborn}, author={Brangewitz, Sonja and Manegold, Jochen}, year={2015} }","short":"S. Brangewitz, J. Manegold, Competition and Product Innovation of Intermediaries in a Differentiated Duopoly, Universität Paderborn, 2015."},"year":"2015","has_accepted_license":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-03-20T07:43:55Z","ddc":["040"],"user_id":"477","department":[{"_id":"205"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"314","file":[{"file_size":631075,"file_id":"1437","access_level":"closed","file_name":"314-PB-2015-04.pdf","date_updated":"2018-03-20T07:43:55Z","date_created":"2018-03-20T07:43:55Z","creator":"florida","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","abstract":[{"text":"On an intermediate goods market we allow for vertical and horizontal product differentiation and analyze the influence of simultaneous competition for resources and customers on the market outcome. Asymmetries between intermediaries cannot arise just from distinct product qualities, but also from different production technologies. The intermediaries face either price or quantity competition on the output market and a monopolistic input supplier on the input market. We find that there exist quality and productivity differences such that for quantity competition only one intermediary is willing to procure inputs from the input supplier, while for price competition both intermediaries are willing to purchase inputs. Considering product innovation for symmetric productivities we derive equilibrium conditions on the investment costs and compare price and quantity competition. It turns out that on the one hand there exist product qualities and degrees of horizontal product differentiation for complements such that asymmetric investment equilibria fail to exist. On the other hand we find that there also exist product qualities and degrees of horizontal product differentiation for substitutes such that existence can be guaranteed if the investment costs are chosen accordingly.","lang":"eng"}],"type":"report"},{"publication":"Proceedings of the 5th IFIP International Embedded Systems Symposium","type":"conference","status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-20T07:43:26Z","creator":"florida","date_created":"2018-03-20T07:43:26Z","file_size":1482481,"file_id":"1436","access_level":"closed","file_name":"315-JungmannJatzkowskiKleinjohann.pdf"}],"abstract":[{"lang":"eng","text":"In this paper, we introduce an approach for combining embedded systems with Service-oriented Computing techniques based on a concrete application scenario from the robotics domain. Our proposed Service-oriented Architecture allows for incorporating computational expensive functionality as services into a distributed computing environment. Furthermore, our framework facilitates a seamless integration of embedded systems such as robots as service providers into the computing environment. The entire communication is based on so-called recipes, which can be interpreted as autonomous messages that contain all necessary information for executing compositions of services."}],"user_id":"15504","_id":"315","project":[{"_id":"1","name":"SFB 901"},{"_id":"10","name":"SFB 901 - Subprojekt B2"},{"name":"SFB 901 - Project Area B","_id":"3"}],"file_date_updated":"2018-03-20T07:43:26Z","ddc":["040"],"has_accepted_license":"1","citation":{"mla":"Jungmann, Alexander, et al. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” <i>Proceedings of the 5th IFIP International Embedded Systems Symposium</i>, 2015.","short":"A. Jungmann, J. Jatzkowski, B. Kleinjohann, in: Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.","bibtex":"@inproceedings{Jungmann_Jatzkowski_Kleinjohann_2015, title={Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study}, booktitle={Proceedings of the 5th IFIP International Embedded Systems Symposium}, author={Jungmann, Alexander and Jatzkowski, Jan and Kleinjohann, Bernd}, year={2015} }","apa":"Jungmann, A., Jatzkowski, J., &#38; Kleinjohann, B. (2015). Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study. In <i>Proceedings of the 5th IFIP International Embedded Systems Symposium</i>.","chicago":"Jungmann, Alexander, Jan Jatzkowski, and Bernd Kleinjohann. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” In <i>Proceedings of the 5th IFIP International Embedded Systems Symposium</i>, 2015.","ieee":"A. Jungmann, J. Jatzkowski, and B. Kleinjohann, “Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study,” in <i>Proceedings of the 5th IFIP International Embedded Systems Symposium</i>, 2015.","ama":"Jungmann A, Jatzkowski J, Kleinjohann B. Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study. In: <i>Proceedings of the 5th IFIP International Embedded Systems Symposium</i>. ; 2015."},"year":"2015","date_created":"2017-10-17T12:41:53Z","author":[{"last_name":"Jungmann","full_name":"Jungmann, Alexander","first_name":"Alexander"},{"first_name":"Jan","last_name":"Jatzkowski","full_name":"Jatzkowski, Jan"},{"full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann","first_name":"Bernd"}],"date_updated":"2022-01-06T06:58:58Z","title":"Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study"}]
