---
_id: '300'
author:
- first_name: Conrad
  full_name: Neumann, Conrad
  last_name: Neumann
citation:
  ama: Neumann C. <i>Ein Framework für Fuzzy Service Matching basierend auf Fuzzy
    Sets</i>. Universität Paderborn; 2015.
  apa: Neumann, C. (2015). <i>Ein Framework für Fuzzy Service Matching basierend auf
    Fuzzy Sets</i>. Universität Paderborn.
  bibtex: '@book{Neumann_2015, title={Ein Framework für Fuzzy Service Matching basierend
    auf Fuzzy Sets}, publisher={Universität Paderborn}, author={Neumann, Conrad},
    year={2015} }'
  chicago: Neumann, Conrad. <i>Ein Framework für Fuzzy Service Matching basierend
    auf Fuzzy Sets</i>. Universität Paderborn, 2015.
  ieee: C. Neumann, <i>Ein Framework für Fuzzy Service Matching basierend auf Fuzzy
    Sets</i>. Universität Paderborn, 2015.
  mla: Neumann, Conrad. <i>Ein Framework für Fuzzy Service Matching basierend auf
    Fuzzy Sets</i>. Universität Paderborn, 2015.
  short: C. Neumann, Ein Framework für Fuzzy Service Matching basierend auf Fuzzy
    Sets, Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:50Z
date_updated: 2022-01-06T06:58:50Z
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publisher: Universität Paderborn
status: public
title: Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets
type: bachelorsthesis
user_id: '477'
year: '2015'
...
---
_id: '301'
author:
- first_name: Jan
  full_name: Bobolz, Jan
  id: '27207'
  last_name: Bobolz
citation:
  ama: Bobolz J. <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn; 2015.
  apa: Bobolz, J. (2015). <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn.
  bibtex: '@book{Bobolz_2015, title={Efficient Verifier-Local Revocation for Anonymous
    Credentials}, publisher={Universität Paderborn}, author={Bobolz, Jan}, year={2015}
    }'
  chicago: Bobolz, Jan. <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  ieee: J. Bobolz, <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  mla: Bobolz, Jan. <i>Efficient Verifier-Local Revocation for Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  short: J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:50Z
date_updated: 2022-01-06T06:58:51Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: open_access
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:47:11Z
  date_updated: 2018-07-20T09:54:22Z
  file_id: '1443'
  file_name: 301-thesis_jbobolz_final_02.pdf
  file_size: 1214027
  relation: main_file
file_date_updated: 2018-07-20T09:54:22Z
has_accepted_license: '1'
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Efficient Verifier-Local Revocation for Anonymous Credentials
type: mastersthesis
urn: '3016'
user_id: '27207'
year: '2015'
...
---
_id: '302'
author:
- first_name: Christian
  full_name: Stroh, Christian
  last_name: Stroh
citation:
  ama: Stroh C. <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn; 2015.
  apa: Stroh, C. (2015). <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn.
  bibtex: '@book{Stroh_2015, title={Efficient Attributes for Pairing-Based Anonymous
    Credentials}, publisher={Universität Paderborn}, author={Stroh, Christian}, year={2015}
    }'
  chicago: Stroh, Christian. <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  ieee: C. Stroh, <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  mla: Stroh, Christian. <i>Efficient Attributes for Pairing-Based Anonymous Credentials</i>.
    Universität Paderborn, 2015.
  short: C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität
    Paderborn, 2015.
date_created: 2017-10-17T12:41:50Z
date_updated: 2022-01-06T06:58:51Z
department:
- _id: '64'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Efficient Attributes for Pairing-Based Anonymous Credentials
type: mastersthesis
user_id: '477'
year: '2015'
...
---
_id: '304'
author:
- first_name: Andreas
  full_name: Koutsopoulos, Andreas
  last_name: Koutsopoulos
citation:
  ama: Koutsopoulos A. <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn; 2015.
  apa: Koutsopoulos, A. (2015). <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn.
  bibtex: '@book{Koutsopoulos_2015, title={Dynamics and Efficiency in Topological
    Self-Stabilization}, publisher={Universität Paderborn}, author={Koutsopoulos,
    Andreas}, year={2015} }'
  chicago: Koutsopoulos, Andreas. <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn, 2015.
  ieee: A. Koutsopoulos, <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn, 2015.
  mla: Koutsopoulos, Andreas. <i>Dynamics and Efficiency in Topological Self-Stabilization</i>.
    Universität Paderborn, 2015.
  short: A. Koutsopoulos, Dynamics and Efficiency in Topological Self-Stabilization,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:51Z
date_updated: 2022-01-06T06:58:53Z
ddc:
- '040'
department:
- _id: '79'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:46:19Z
  date_updated: 2018-03-20T07:46:19Z
  file_id: '1441'
  file_name: 304-Dissertation_-_Koutsopoulos.pdf
  file_size: 2275834
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:46:19Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subproject A1
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: Dynamics and Efficiency in Topological Self-Stabilization
type: dissertation
user_id: '15504'
year: '2015'
...
---
_id: '305'
author:
- first_name: Sebastian
  full_name: Kniesburges, Sebastian
  last_name: Kniesburges
citation:
  ama: Kniesburges S. <i>Distributed Data Structures and the Power of Topological
    Self-Stabilization</i>. Universität Paderborn; 2015.
  apa: Kniesburges, S. (2015). <i>Distributed Data Structures and the Power of topological
    Self-Stabilization</i>. Universität Paderborn.
  bibtex: '@book{Kniesburges_2015, title={Distributed Data Structures and the Power
    of topological Self-Stabilization}, publisher={Universität Paderborn}, author={Kniesburges,
    Sebastian}, year={2015} }'
  chicago: Kniesburges, Sebastian. <i>Distributed Data Structures and the Power of
    Topological Self-Stabilization</i>. Universität Paderborn, 2015.
  ieee: S. Kniesburges, <i>Distributed Data Structures and the Power of topological
    Self-Stabilization</i>. Universität Paderborn, 2015.
  mla: Kniesburges, Sebastian. <i>Distributed Data Structures and the Power of Topological
    Self-Stabilization</i>. Universität Paderborn, 2015.
  short: S. Kniesburges, Distributed Data Structures and the Power of Topological
    Self-Stabilization, Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:51Z
date_updated: 2022-01-06T06:58:54Z
ddc:
- '040'
department:
- _id: '79'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-13T09:14:43Z
  date_updated: 2018-03-13T09:14:43Z
  file_id: '1206'
  file_name: 305-Dissertation_-_Kniesburges.pdf
  file_size: 1709094
  relation: main_file
  success: 1
file_date_updated: 2018-03-13T09:14:43Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '5'
  name: SFB 901 - Subproject A1
- _id: '13'
  name: SFB 901 - Subproject C1
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: Distributed Data Structures and the Power of topological Self-Stabilization
type: dissertation
user_id: '15504'
year: '2015'
...
---
_id: '306'
author:
- first_name: Christina
  full_name: Kunisch, Christina
  last_name: Kunisch
citation:
  ama: Kunisch C. <i>Diffusion of Innovations in Social Networks</i>. Universität
    Paderborn; 2015.
  apa: Kunisch, C. (2015). <i>Diffusion of Innovations in Social Networks</i>. Universität
    Paderborn.
  bibtex: '@book{Kunisch_2015, title={Diffusion of Innovations in Social Networks},
    publisher={Universität Paderborn}, author={Kunisch, Christina}, year={2015} }'
  chicago: Kunisch, Christina. <i>Diffusion of Innovations in Social Networks</i>.
    Universität Paderborn, 2015.
  ieee: C. Kunisch, <i>Diffusion of Innovations in Social Networks</i>. Universität
    Paderborn, 2015.
  mla: Kunisch, Christina. <i>Diffusion of Innovations in Social Networks</i>. Universität
    Paderborn, 2015.
  short: C. Kunisch, Diffusion of Innovations in Social Networks, Universität Paderborn,
    2015.
date_created: 2017-10-17T12:41:51Z
date_updated: 2022-01-06T06:58:54Z
department:
- _id: '280'
project:
- _id: '1'
  name: SFB 901
- _id: '7'
  name: SFB 901 - Subprojekt A3
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Burkhard
  full_name: Hehenkamp, Burkhard
  id: '37339'
  last_name: Hehenkamp
title: Diffusion of Innovations in Social Networks
type: bachelorsthesis
user_id: '42447'
year: '2015'
...
---
_id: '308'
author:
- first_name: Alina
  full_name: Reimann, Alina
  last_name: Reimann
citation:
  ama: Reimann A. <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>. Universität
    Paderborn; 2015.
  apa: Reimann, A. (2015). <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>.
    Universität Paderborn.
  bibtex: '@book{Reimann_2015, title={Die Wirksamkeit von Zertifikaten als Qualitätssignal},
    publisher={Universität Paderborn}, author={Reimann, Alina}, year={2015} }'
  chicago: Reimann, Alina. <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>.
    Universität Paderborn, 2015.
  ieee: A. Reimann, <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>. Universität
    Paderborn, 2015.
  mla: Reimann, Alina. <i>Die Wirksamkeit von Zertifikaten als Qualitätssignal</i>.
    Universität Paderborn, 2015.
  short: A. Reimann, Die Wirksamkeit von Zertifikaten als Qualitätssignal, Universität
    Paderborn, 2015.
date_created: 2017-10-17T12:41:52Z
date_updated: 2022-01-06T06:58:55Z
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '8'
  name: SFB 901 - Subprojekt A4
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
title: Die Wirksamkeit von Zertifikaten als Qualitätssignal
type: bachelorsthesis
user_id: '477'
year: '2015'
...
---
_id: '309'
author:
- first_name: Barlas
  full_name: Topal, Barlas
  last_name: Topal
citation:
  ama: Topal B. <i>Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen</i>.
    Universität Paderborn; 2015.
  apa: Topal, B. (2015). <i>Die Einführung der EU-Merger Guidelines - Effizienz und
    Wohlfahrtswirkungen</i>. Universität Paderborn.
  bibtex: '@book{Topal_2015, title={Die Einführung der EU-Merger Guidelines - Effizienz
    und Wohlfahrtswirkungen}, publisher={Universität Paderborn}, author={Topal, Barlas},
    year={2015} }'
  chicago: Topal, Barlas. <i>Die Einführung der EU-Merger Guidelines - Effizienz und
    Wohlfahrtswirkungen</i>. Universität Paderborn, 2015.
  ieee: B. Topal, <i>Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen</i>.
    Universität Paderborn, 2015.
  mla: Topal, Barlas. <i>Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen</i>.
    Universität Paderborn, 2015.
  short: B. Topal, Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:52Z
date_updated: 2022-01-06T06:58:55Z
department:
- _id: '280'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '7'
  name: SFB 901 - Subprojekt A3
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Burkhard
  full_name: Hehenkamp, Burkhard
  id: '37339'
  last_name: Hehenkamp
title: Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen
type: mastersthesis
user_id: '42447'
year: '2015'
...
---
_id: '310'
author:
- first_name: Melanie
  full_name: Bruns, Melanie
  last_name: Bruns
citation:
  ama: Bruns M. <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>.
    Universität Paderborn; 2015.
  apa: Bruns, M. (2015). <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>.
    Universität Paderborn.
  bibtex: '@book{Bruns_2015, title={Design of an Evaluation Strategy for Fuzzy Service
    Matching}, publisher={Universität Paderborn}, author={Bruns, Melanie}, year={2015}
    }'
  chicago: Bruns, Melanie. <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>.
    Universität Paderborn, 2015.
  ieee: M. Bruns, <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>.
    Universität Paderborn, 2015.
  mla: Bruns, Melanie. <i>Design of an Evaluation Strategy for Fuzzy Service Matching</i>.
    Universität Paderborn, 2015.
  short: M. Bruns, Design of an Evaluation Strategy for Fuzzy Service Matching, Universität
    Paderborn, 2015.
date_created: 2017-10-17T12:41:52Z
date_updated: 2022-01-06T06:58:55Z
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publisher: Universität Paderborn
status: public
title: Design of an Evaluation Strategy for Fuzzy Service Matching
type: bachelorsthesis
user_id: '477'
year: '2015'
...
---
_id: '312'
author:
- first_name: Patrick
  full_name: Schleiter, Patrick
  last_name: Schleiter
citation:
  ama: Schleiter P. <i>Constructions of Fully Secure Predicate Encryption Schemes</i>.
    Universität Paderborn; 2015.
  apa: Schleiter, P. (2015). <i>Constructions of Fully Secure Predicate Encryption
    Schemes</i>. Universität Paderborn.
  bibtex: '@book{Schleiter_2015, title={Constructions of Fully Secure Predicate Encryption
    Schemes}, publisher={Universität Paderborn}, author={Schleiter, Patrick}, year={2015}
    }'
  chicago: Schleiter, Patrick. <i>Constructions of Fully Secure Predicate Encryption
    Schemes</i>. Universität Paderborn, 2015.
  ieee: P. Schleiter, <i>Constructions of Fully Secure Predicate Encryption Schemes</i>.
    Universität Paderborn, 2015.
  mla: Schleiter, Patrick. <i>Constructions of Fully Secure Predicate Encryption Schemes</i>.
    Universität Paderborn, 2015.
  short: P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:52Z
date_updated: 2022-01-06T06:58:57Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:44:55Z
  date_updated: 2018-03-20T07:44:55Z
  file_id: '1439'
  file_name: 312-MA_2015_Schleiter_Constructions_of_fully_secure_PE_schemes_01.pdf
  file_size: 721996
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:44:55Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Constructions of Fully Secure Predicate Encryption Schemes
type: mastersthesis
user_id: '477'
year: '2015'
...
---
_id: '3120'
author:
- first_name: Florian
  full_name: Böhl, Florian
  last_name: Böhl
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jessica
  full_name: Koch, Jessica
  last_name: Koch
- first_name: Christoph
  full_name: Striecks, Christoph
  last_name: Striecks
citation:
  ama: 'Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures
    From Standard Assumptions. <i>J Cryptology</i>. 2015;(1):176--208. doi:<a href="https://doi.org/10.1007/s00145-014-9183-z">10.1007/s00145-014-9183-z</a>'
  apa: 'Böhl, F., Hofheinz, D., Jager, T., Koch, J., &#38; Striecks, C. (2015). Confined
    Guessing: New Signatures From Standard Assumptions. <i>J. Cryptology</i>, (1),
    176--208. <a href="https://doi.org/10.1007/s00145-014-9183-z">https://doi.org/10.1007/s00145-014-9183-z</a>'
  bibtex: '@article{Böhl_Hofheinz_Jager_Koch_Striecks_2015, title={Confined Guessing:
    New Signatures From Standard Assumptions}, DOI={<a href="https://doi.org/10.1007/s00145-014-9183-z">10.1007/s00145-014-9183-z</a>},
    number={1}, journal={J. Cryptology}, author={Böhl, Florian and Hofheinz, Dennis
    and Jager, Tibor and Koch, Jessica and Striecks, Christoph}, year={2015}, pages={176--208}
    }'
  chicago: 'Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph
    Striecks. “Confined Guessing: New Signatures From Standard Assumptions.” <i>J.
    Cryptology</i>, no. 1 (2015): 176--208. <a href="https://doi.org/10.1007/s00145-014-9183-z">https://doi.org/10.1007/s00145-014-9183-z</a>.'
  ieee: 'F. Böhl, D. Hofheinz, T. Jager, J. Koch, and C. Striecks, “Confined Guessing:
    New Signatures From Standard Assumptions,” <i>J. Cryptology</i>, no. 1, pp. 176--208,
    2015.'
  mla: 'Böhl, Florian, et al. “Confined Guessing: New Signatures From Standard Assumptions.”
    <i>J. Cryptology</i>, no. 1, 2015, pp. 176--208, doi:<a href="https://doi.org/10.1007/s00145-014-9183-z">10.1007/s00145-014-9183-z</a>.'
  short: F. Böhl, D. Hofheinz, T. Jager, J. Koch, C. Striecks, J. Cryptology (2015)
    176--208.
date_created: 2018-06-07T09:17:17Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/s00145-014-9183-z
extern: '1'
issue: '1'
page: 176--208
publication: J. Cryptology
status: public
title: 'Confined Guessing: New Signatures From Standard Assumptions'
type: journal_article
user_id: '38235'
year: '2015'
...
---
_id: '3121'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against
    Weaknesses in PKCS#1 v1.5 Encryption. In: <i>Proceedings of the 22nd ACM SIGSAC
    Conference on Computer and Communications Security, Denver, CO, USA, October 12-16,
    2015</i>. ; 2015:1185--1196. doi:<a href="https://doi.org/10.1145/2810103.2813657">10.1145/2810103.2813657</a>'
  apa: Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). On the Security of TLS
    1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In <i>Proceedings of
    the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver,
    CO, USA, October 12-16, 2015</i> (pp. 1185--1196). <a href="https://doi.org/10.1145/2810103.2813657">https://doi.org/10.1145/2810103.2813657</a>
  bibtex: '@inproceedings{Jager_Schwenk_Somorovsky_2015, title={On the Security of
    TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}, DOI={<a href="https://doi.org/10.1145/2810103.2813657">10.1145/2810103.2813657</a>},
    booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
    Security, Denver, CO, USA, October 12-16, 2015}, author={Jager, Tibor and Schwenk,
    Jörg and Somorovsky, Juraj}, year={2015}, pages={1185--1196} }'
  chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “On the Security of TLS
    1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” In <i>Proceedings
    of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver,
    CO, USA, October 12-16, 2015</i>, 1185--1196, 2015. <a href="https://doi.org/10.1145/2810103.2813657">https://doi.org/10.1145/2810103.2813657</a>.
  ieee: T. Jager, J. Schwenk, and J. Somorovsky, “On the Security of TLS 1.3 and QUIC
    Against Weaknesses in PKCS#1 v1.5 Encryption,” in <i>Proceedings of the 22nd ACM
    SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October
    12-16, 2015</i>, 2015, pp. 1185--1196.
  mla: Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses
    in PKCS#1 v1.5 Encryption.” <i>Proceedings of the 22nd ACM SIGSAC Conference on
    Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>,
    2015, pp. 1185--1196, doi:<a href="https://doi.org/10.1145/2810103.2813657">10.1145/2810103.2813657</a>.
  short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC
    Conference on Computer and Communications Security, Denver, CO, USA, October 12-16,
    2015, 2015, pp. 1185--1196.'
date_created: 2018-06-07T09:17:47Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1145/2810103.2813657
extern: '1'
page: 1185--1196
publication: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
  Security, Denver, CO, USA, October 12-16, 2015
status: public
title: On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3122'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH.
    In: <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research
    in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
    I</i>. ; 2015:407--425. doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>'
  apa: Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve
    Attacks on TLS-ECDH. In <i>Computer Security - ESORICS 2015 - 20th European Symposium
    on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
    Part I</i> (pp. 407--425). <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>
  bibtex: '@inproceedings{Jager_Schwenk_Somorovsky_2015, title={Practical Invalid
    Curve Attacks on TLS-ECDH}, DOI={<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>},
    booktitle={Computer Security - ESORICS 2015 - 20th European Symposium on Research
    in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
    I}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015},
    pages={407--425} }'
  chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve
    Attacks on TLS-ECDH.” In <i>Computer Security - ESORICS 2015 - 20th European Symposium
    on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
    Part I</i>, 407--425, 2015. <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>.
  ieee: T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks
    on TLS-ECDH,” in <i>Computer Security - ESORICS 2015 - 20th European Symposium
    on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
    Part I</i>, 2015, pp. 407--425.
  mla: Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer
    Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security,
    Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>, 2015, pp. 407--425,
    doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>.
  short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015
    - 20th European Symposium on Research in Computer Security, Vienna, Austria, September
    21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.'
date_created: 2018-06-07T09:18:33Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-319-24174-6_21
extern: '1'
page: 407--425
publication: Computer Security - ESORICS 2015 - 20th European Symposium on Research
  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
  I
status: public
title: Practical Invalid Curve Attacks on TLS-ECDH
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3123'
author:
- first_name: Felix
  full_name: Heuer, Felix
  last_name: Heuer
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
citation:
  ama: 'Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of
    Practical Public-Key Encryption Schemes. In: <i>Public-Key Cryptography - PKC
    2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>.
    ; 2015:27--51. doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_2">10.1007/978-3-662-46447-2_2</a>'
  apa: Heuer, F., Jager, T., Kiltz, E., &#38; Schäge, S. (2015). On the Selective
    Opening Security of Practical Public-Key Encryption Schemes. In <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>
    (pp. 27--51). <a href="https://doi.org/10.1007/978-3-662-46447-2_2">https://doi.org/10.1007/978-3-662-46447-2_2</a>
  bibtex: '@inproceedings{Heuer_Jager_Kiltz_Schäge_2015, title={On the Selective Opening
    Security of Practical Public-Key Encryption Schemes}, DOI={<a href="https://doi.org/10.1007/978-3-662-46447-2_2">10.1007/978-3-662-46447-2_2</a>},
    booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings}, author={Heuer, Felix and Jager, Tibor and Kiltz,
    Eike and Schäge, Sven}, year={2015}, pages={27--51} }'
  chicago: Heuer, Felix, Tibor Jager, Eike Kiltz, and Sven Schäge. “On the Selective
    Opening Security of Practical Public-Key Encryption Schemes.” In <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    27--51, 2015. <a href="https://doi.org/10.1007/978-3-662-46447-2_2">https://doi.org/10.1007/978-3-662-46447-2_2</a>.
  ieee: F. Heuer, T. Jager, E. Kiltz, and S. Schäge, “On the Selective Opening Security
    of Practical Public-Key Encryption Schemes,” in <i>Public-Key Cryptography - PKC
    2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    2015, pp. 27--51.
  mla: Heuer, Felix, et al. “On the Selective Opening Security of Practical Public-Key
    Encryption Schemes.” <i>Public-Key Cryptography - PKC 2015 - 18th IACR International
    Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
    USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 27--51, doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_2">10.1007/978-3-662-46447-2_2</a>.
  short: 'F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC
    2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015,
    pp. 27--51.'
date_created: 2018-06-07T09:19:04Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46447-2_2
extern: '1'
page: 27--51
publication: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
  30 - April 1, 2015, Proceedings
status: public
title: On the Selective Opening Security of Practical Public-Key Encryption Schemes
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3124'
author:
- first_name: Florian
  full_name: Bergsma, Florian
  last_name: Bergsma
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security:
    An Efficient and Generic Construction in the Standard Model. In: <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>.
    ; 2015:477--494. doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_21">10.1007/978-3-662-46447-2_21</a>'
  apa: 'Bergsma, F., Jager, T., &#38; Schwenk, J. (2015). One-Round Key Exchange with
    Strong Security: An Efficient and Generic Construction in the Standard Model.
    In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings</i> (pp. 477--494). <a href="https://doi.org/10.1007/978-3-662-46447-2_21">https://doi.org/10.1007/978-3-662-46447-2_21</a>'
  bibtex: '@inproceedings{Bergsma_Jager_Schwenk_2015, title={One-Round Key Exchange
    with Strong Security: An Efficient and Generic Construction in the Standard Model},
    DOI={<a href="https://doi.org/10.1007/978-3-662-46447-2_21">10.1007/978-3-662-46447-2_21</a>},
    booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings}, author={Bergsma, Florian and Jager, Tibor and
    Schwenk, Jörg}, year={2015}, pages={477--494} }'
  chicago: 'Bergsma, Florian, Tibor Jager, and Jörg Schwenk. “One-Round Key Exchange
    with Strong Security: An Efficient and Generic Construction in the Standard Model.”
    In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings</i>, 477--494, 2015. <a href="https://doi.org/10.1007/978-3-662-46447-2_21">https://doi.org/10.1007/978-3-662-46447-2_21</a>.'
  ieee: 'F. Bergsma, T. Jager, and J. Schwenk, “One-Round Key Exchange with Strong
    Security: An Efficient and Generic Construction in the Standard Model,” in <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    2015, pp. 477--494.'
  mla: 'Bergsma, Florian, et al. “One-Round Key Exchange with Strong Security: An
    Efficient and Generic Construction in the Standard Model.” <i>Public-Key Cryptography
    - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    2015, pp. 477--494, doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_21">10.1007/978-3-662-46447-2_21</a>.'
  short: 'F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015
    - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography,
    Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.'
date_created: 2018-06-07T09:19:47Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46447-2_21
extern: '1'
page: 477--494
publication: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
  30 - April 1, 2015, Proceedings
status: public
title: 'One-Round Key Exchange with Strong Security: An Efficient and Generic Construction
  in the Standard Model'
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3125'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: 'Jager T. Verifiable Random Functions from Weaker Assumptions. In: <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i>. ; 2015:121--143. doi:<a href="https://doi.org/10.1007/978-3-662-46497-7_5">10.1007/978-3-662-46497-7_5</a>'
  apa: Jager, T. (2015). Verifiable Random Functions from Weaker Assumptions. In <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i> (pp. 121--143). <a href="https://doi.org/10.1007/978-3-662-46497-7_5">https://doi.org/10.1007/978-3-662-46497-7_5</a>
  bibtex: '@inproceedings{Jager_2015, title={Verifiable Random Functions from Weaker
    Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-662-46497-7_5">10.1007/978-3-662-46497-7_5</a>},
    booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
    2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, author={Jager,
    Tibor}, year={2015}, pages={121--143} }'
  chicago: Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” In
    <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015,
    Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>, 121--143, 2015.
    <a href="https://doi.org/10.1007/978-3-662-46497-7_5">https://doi.org/10.1007/978-3-662-46497-7_5</a>.
  ieee: T. Jager, “Verifiable Random Functions from Weaker Assumptions,” in <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143.
  mla: Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143, doi:<a href="https://doi.org/10.1007/978-3-662-46497-7_5">10.1007/978-3-662-46497-7_5</a>.
  short: 'T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference,
    TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp.
    121--143.'
date_created: 2018-06-07T09:20:19Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46497-7_5
extern: '1'
page: 121--143
publication: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}
status: public
title: Verifiable Random Functions from Weaker Assumptions
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3126'
author:
- first_name: Christoph
  full_name: Bader, Christoph
  last_name: Bader
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Yong
  full_name: Li, Yong
  last_name: Li
citation:
  ama: 'Bader C, Hofheinz D, Jager T, Kiltz E, Li Y. Tightly-Secure Authenticated
    Key Exchange. In: <i>Theory of Cryptography - 12th Theory of Cryptography Conference,
    TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>. ; 2015:629--658.
    doi:<a href="https://doi.org/10.1007/978-3-662-46494-6_26">10.1007/978-3-662-46494-6_26</a>'
  apa: Bader, C., Hofheinz, D., Jager, T., Kiltz, E., &#38; Li, Y. (2015). Tightly-Secure
    Authenticated Key Exchange. In <i>Theory of Cryptography - 12th Theory of Cryptography
    Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>
    (pp. 629--658). <a href="https://doi.org/10.1007/978-3-662-46494-6_26">https://doi.org/10.1007/978-3-662-46494-6_26</a>
  bibtex: '@inproceedings{Bader_Hofheinz_Jager_Kiltz_Li_2015, title={Tightly-Secure
    Authenticated Key Exchange}, DOI={<a href="https://doi.org/10.1007/978-3-662-46494-6_26">10.1007/978-3-662-46494-6_26</a>},
    booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
    2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}, author={Bader,
    Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong},
    year={2015}, pages={629--658} }'
  chicago: Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li.
    “Tightly-Secure Authenticated Key Exchange.” In <i>Theory of Cryptography - 12th
    Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015,
    Proceedings, Part I</i>, 629--658, 2015. <a href="https://doi.org/10.1007/978-3-662-46494-6_26">https://doi.org/10.1007/978-3-662-46494-6_26</a>.
  ieee: C. Bader, D. Hofheinz, T. Jager, E. Kiltz, and Y. Li, “Tightly-Secure Authenticated
    Key Exchange,” in <i>Theory of Cryptography - 12th Theory of Cryptography Conference,
    TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>, 2015, pp.
    629--658.
  mla: Bader, Christoph, et al. “Tightly-Secure Authenticated Key Exchange.” <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part I</i>, 2015, pp. 629--658, doi:<a href="https://doi.org/10.1007/978-3-662-46494-6_26">10.1007/978-3-662-46494-6_26</a>.
  short: 'C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography
    - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25,
    2015, Proceedings, Part I, 2015, pp. 629--658.'
date_created: 2018-06-07T09:20:48Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46494-6_26
extern: '1'
page: 629--658
publication: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
status: public
title: Tightly-Secure Authenticated Key Exchange
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '313'
abstract:
- lang: eng
  text: 'Nowadays, many service providers offer software components in the form of
    Software as a Service. Requesters that want to discover those services in order
    to use or to integrate them, need to find out which service satisfies their requirements
    best. For this purpose, service matching approaches determine how well the specifications
    of provided services satisfy their requirements (including structural, behavioral,
    and non-functional requirements). In this paper, we describe the tool-suite MatchBox
    that allows the integration of existing service matchers and their combination
    as part of flexibly configurable matching processes. Taking requirements and service
    specifications as an input, MatchBox is able to execute such matching processes
    and deliver rich matching results. In contrast to related tools, MatchBox allows
    users to take into account many different kinds of requirements, while it also
    provides the flexibility to control the matching process in many different ways. '
author:
- first_name: Paul
  full_name: Börding, Paul
  last_name: Börding
- first_name: Melanie
  full_name: Bruns, Melanie
  last_name: Bruns
- first_name: Marie Christin
  full_name: Platenius, Marie Christin
  last_name: Platenius
citation:
  ama: 'Börding P, Bruns M, Platenius MC. Comprehensive Service Matching with MatchBox.
    In: <i>10th Joint Meeting of the European Software Engineering Conference and
    the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)</i>.
    ; 2015:974--977. doi:<a href="https://doi.org/10.1145/2786805.2803181">10.1145/2786805.2803181</a>'
  apa: Börding, P., Bruns, M., &#38; Platenius, M. C. (2015). Comprehensive Service
    Matching with MatchBox. In <i>10th Joint Meeting of the European Software Engineering
    Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering
    (ESEC/FSE’15)</i> (pp. 974--977). <a href="https://doi.org/10.1145/2786805.2803181">https://doi.org/10.1145/2786805.2803181</a>
  bibtex: '@inproceedings{Börding_Bruns_Platenius_2015, title={Comprehensive Service
    Matching with MatchBox}, DOI={<a href="https://doi.org/10.1145/2786805.2803181">10.1145/2786805.2803181</a>},
    booktitle={10th Joint Meeting of the European Software Engineering Conference
    and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)},
    author={Börding, Paul and Bruns, Melanie and Platenius, Marie Christin}, year={2015},
    pages={974--977} }'
  chicago: Börding, Paul, Melanie Bruns, and Marie Christin Platenius. “Comprehensive
    Service Matching with MatchBox.” In <i>10th Joint Meeting of the European Software
    Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software
    Engineering (ESEC/FSE’15)</i>, 974--977, 2015. <a href="https://doi.org/10.1145/2786805.2803181">https://doi.org/10.1145/2786805.2803181</a>.
  ieee: P. Börding, M. Bruns, and M. C. Platenius, “Comprehensive Service Matching
    with MatchBox,” in <i>10th Joint Meeting of the European Software Engineering
    Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering
    (ESEC/FSE’15)</i>, 2015, pp. 974--977.
  mla: Börding, Paul, et al. “Comprehensive Service Matching with MatchBox.” <i>10th
    Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT
    Symposium on the Foundations of Software Engineering (ESEC/FSE’15)</i>, 2015,
    pp. 974--977, doi:<a href="https://doi.org/10.1145/2786805.2803181">10.1145/2786805.2803181</a>.
  short: 'P. Börding, M. Bruns, M.C. Platenius, in: 10th Joint Meeting of the European
    Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977.'
date_created: 2017-10-17T12:41:53Z
date_updated: 2022-01-06T06:58:58Z
ddc:
- '040'
department:
- _id: '76'
doi: 10.1145/2786805.2803181
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:44:26Z
  date_updated: 2018-03-20T07:44:26Z
  file_id: '1438'
  file_name: 313-p974-boerding.pdf
  file_size: 875687
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:44:26Z
has_accepted_license: '1'
language:
- iso: eng
page: 974--977
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publication: 10th Joint Meeting of the European Software Engineering Conference and
  the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15)
status: public
title: Comprehensive Service Matching with MatchBox
type: conference
user_id: '477'
year: '2015'
...
---
_id: '314'
abstract:
- lang: eng
  text: On an intermediate goods market we allow for vertical and horizontal product
    differentiation and analyze the influence of simultaneous competition for resources
    and customers on the market outcome. Asymmetries between intermediaries cannot
    arise just from distinct product qualities, but also from different production
    technologies. The intermediaries face either price or quantity competition on
    the output market and a monopolistic input supplier on the input market. We find
    that there exist quality and productivity differences such that for quantity competition
    only one intermediary is willing to procure inputs from the input supplier, while
    for price competition both intermediaries are willing to purchase inputs. Considering
    product innovation for symmetric productivities we derive equilibrium conditions
    on the investment costs and compare price and quantity competition. It turns out
    that on the one hand there exist product qualities and degrees of horizontal product
    differentiation for complements such that asymmetric investment equilibria fail
    to exist. On the other hand we find that there also exist product qualities and
    degrees of horizontal product differentiation for substitutes such that existence
    can be guaranteed if the investment costs are chosen accordingly.
author:
- first_name: Sonja
  full_name: Brangewitz, Sonja
  last_name: Brangewitz
- first_name: Jochen
  full_name: Manegold, Jochen
  last_name: Manegold
citation:
  ama: Brangewitz S, Manegold J. <i>Competition and Product Innovation of Intermediaries
    in a Differentiated Duopoly</i>. Universität Paderborn; 2015.
  apa: Brangewitz, S., &#38; Manegold, J. (2015). <i>Competition and Product Innovation
    of Intermediaries in a Differentiated Duopoly</i>. Universität Paderborn.
  bibtex: '@book{Brangewitz_Manegold_2015, title={Competition and Product Innovation
    of Intermediaries in a Differentiated Duopoly}, publisher={Universität Paderborn},
    author={Brangewitz, Sonja and Manegold, Jochen}, year={2015} }'
  chicago: Brangewitz, Sonja, and Jochen Manegold. <i>Competition and Product Innovation
    of Intermediaries in a Differentiated Duopoly</i>. Universität Paderborn, 2015.
  ieee: S. Brangewitz and J. Manegold, <i>Competition and Product Innovation of Intermediaries
    in a Differentiated Duopoly</i>. Universität Paderborn, 2015.
  mla: Brangewitz, Sonja, and Jochen Manegold. <i>Competition and Product Innovation
    of Intermediaries in a Differentiated Duopoly</i>. Universität Paderborn, 2015.
  short: S. Brangewitz, J. Manegold, Competition and Product Innovation of Intermediaries
    in a Differentiated Duopoly, Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:53Z
date_updated: 2022-01-06T06:58:58Z
ddc:
- '040'
department:
- _id: '205'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:43:55Z
  date_updated: 2018-03-20T07:43:55Z
  file_id: '1437'
  file_name: 314-PB-2015-04.pdf
  file_size: 631075
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:43:55Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '7'
  name: SFB 901 - Subprojekt A3
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
title: Competition and Product Innovation of Intermediaries in a Differentiated Duopoly
type: report
user_id: '477'
year: '2015'
...
---
_id: '315'
abstract:
- lang: eng
  text: In this paper, we introduce an approach for combining embedded systems with
    Service-oriented Computing techniques based on a concrete application scenario
    from the robotics domain. Our proposed Service-oriented Architecture allows for
    incorporating computational expensive functionality as services into a distributed
    computing environment. Furthermore, our framework facilitates a seamless integration
    of embedded systems such as robots as service providers into the computing environment.
    The entire communication is based on so-called recipes, which can be interpreted
    as autonomous messages that contain all necessary information for executing compositions
    of services.
author:
- first_name: Alexander
  full_name: Jungmann, Alexander
  last_name: Jungmann
- first_name: Jan
  full_name: Jatzkowski, Jan
  last_name: Jatzkowski
- first_name: Bernd
  full_name: Kleinjohann, Bernd
  last_name: Kleinjohann
citation:
  ama: 'Jungmann A, Jatzkowski J, Kleinjohann B. Combining Service-oriented Computing
    with Embedded Systems - A Robotics Case Study. In: <i>Proceedings of the 5th IFIP
    International Embedded Systems Symposium</i>. ; 2015.'
  apa: Jungmann, A., Jatzkowski, J., &#38; Kleinjohann, B. (2015). Combining Service-oriented
    Computing with Embedded Systems - A Robotics Case Study. In <i>Proceedings of
    the 5th IFIP International Embedded Systems Symposium</i>.
  bibtex: '@inproceedings{Jungmann_Jatzkowski_Kleinjohann_2015, title={Combining Service-oriented
    Computing with Embedded Systems - A Robotics Case Study}, booktitle={Proceedings
    of the 5th IFIP International Embedded Systems Symposium}, author={Jungmann, Alexander
    and Jatzkowski, Jan and Kleinjohann, Bernd}, year={2015} }'
  chicago: Jungmann, Alexander, Jan Jatzkowski, and Bernd Kleinjohann. “Combining
    Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” In
    <i>Proceedings of the 5th IFIP International Embedded Systems Symposium</i>, 2015.
  ieee: A. Jungmann, J. Jatzkowski, and B. Kleinjohann, “Combining Service-oriented
    Computing with Embedded Systems - A Robotics Case Study,” in <i>Proceedings of
    the 5th IFIP International Embedded Systems Symposium</i>, 2015.
  mla: Jungmann, Alexander, et al. “Combining Service-Oriented Computing with Embedded
    Systems - A Robotics Case Study.” <i>Proceedings of the 5th IFIP International
    Embedded Systems Symposium</i>, 2015.
  short: 'A. Jungmann, J. Jatzkowski, B. Kleinjohann, in: Proceedings of the 5th IFIP
    International Embedded Systems Symposium, 2015.'
date_created: 2017-10-17T12:41:53Z
date_updated: 2022-01-06T06:58:58Z
ddc:
- '040'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:43:26Z
  date_updated: 2018-03-20T07:43:26Z
  file_id: '1436'
  file_name: 315-JungmannJatzkowskiKleinjohann.pdf
  file_size: 1482481
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:43:26Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '10'
  name: SFB 901 - Subprojekt B2
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 5th IFIP International Embedded Systems Symposium
status: public
title: Combining Service-oriented Computing with Embedded Systems - A Robotics Case
  Study
type: conference
user_id: '15504'
year: '2015'
...
