[{"type":"journal_article","status":"public","user_id":"158","department":[{"_id":"61"}],"project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"_id":"3843","file_date_updated":"2018-08-08T09:56:05Z","article_type":"original","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["0146-9592","1539-4794"]},"citation":{"ama":"Grynko Y, Shkuratov Y, Förstner J. Light scattering by irregular particles much larger than the wavelength with wavelength-scale surface roughness. <i>Optics Letters</i>. 2016;41(15):3491-3493. doi:<a href=\"https://doi.org/10.1364/ol.41.003491\">10.1364/ol.41.003491</a>","ieee":"Y. Grynko, Y. Shkuratov, and J. Förstner, “Light scattering by irregular particles much larger than the wavelength with wavelength-scale surface roughness,” <i>Optics Letters</i>, vol. 41, no. 15, pp. 3491–3493, 2016.","chicago":"Grynko, Yevgen, Yuriy Shkuratov, and Jens Förstner. “Light Scattering by Irregular Particles Much Larger than the Wavelength with Wavelength-Scale Surface Roughness.” <i>Optics Letters</i> 41, no. 15 (2016): 3491–93. <a href=\"https://doi.org/10.1364/ol.41.003491\">https://doi.org/10.1364/ol.41.003491</a>.","short":"Y. Grynko, Y. Shkuratov, J. Förstner, Optics Letters 41 (2016) 3491–3493.","mla":"Grynko, Yevgen, et al. “Light Scattering by Irregular Particles Much Larger than the Wavelength with Wavelength-Scale Surface Roughness.” <i>Optics Letters</i>, vol. 41, no. 15, The Optical Society, 2016, pp. 3491–93, doi:<a href=\"https://doi.org/10.1364/ol.41.003491\">10.1364/ol.41.003491</a>.","bibtex":"@article{Grynko_Shkuratov_Förstner_2016, title={Light scattering by irregular particles much larger than the wavelength with wavelength-scale surface roughness}, volume={41}, DOI={<a href=\"https://doi.org/10.1364/ol.41.003491\">10.1364/ol.41.003491</a>}, number={15}, journal={Optics Letters}, publisher={The Optical Society}, author={Grynko, Yevgen and Shkuratov, Yuriy and Förstner, Jens}, year={2016}, pages={3491–3493} }","apa":"Grynko, Y., Shkuratov, Y., &#38; Förstner, J. (2016). Light scattering by irregular particles much larger than the wavelength with wavelength-scale surface roughness. <i>Optics Letters</i>, <i>41</i>(15), 3491–3493. <a href=\"https://doi.org/10.1364/ol.41.003491\">https://doi.org/10.1364/ol.41.003491</a>"},"page":"3491-3493","intvolume":"        41","author":[{"first_name":"Yevgen","id":"26059","full_name":"Grynko, Yevgen","last_name":"Grynko"},{"first_name":"Yuriy","full_name":"Shkuratov, Yuriy","last_name":"Shkuratov"},{"first_name":"Jens","orcid":"0000-0001-7059-9862","last_name":"Förstner","id":"158","full_name":"Förstner, Jens"}],"volume":41,"date_updated":"2022-01-06T06:59:43Z","doi":"10.1364/ol.41.003491","publication":"Optics Letters","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-08-08T09:56:05Z","creator":"hclaudia","date_created":"2018-08-08T09:56:05Z","file_size":1581998,"file_id":"3844","file_name":"2016-07 Grynko,Förstner_Light scattering by irregular particles much larger than the wavelength with wavelength-scale surface roughness_Optics Letter ol-41-15-3491.pdf","access_level":"closed"}],"abstract":[{"text":"We simulate light scattering by random irregular particles that have dimensions much larger than the wavelength of incident light at the size parameter of 𝑋=200 using the discontinuous Galerkin time domain method. A comparison of the DGTD solution for smoothly faceted particles with that obtained with a geometric optics model shows good agreement for the scattering angle curves of intensity and polarization. If a wavelength-scale surface roughness is introduced, diffuse scattering at rough interface results in smooth and featureless curves for all scattering matrix elements which is consistent with the laboratory measurements of real samples.","lang":"eng"}],"language":[{"iso":"eng"}],"ddc":["530"],"keyword":["tet_topic_scattering"],"issue":"15","year":"2016","date_created":"2018-08-08T09:53:28Z","publisher":"The Optical Society","title":"Light scattering by irregular particles much larger than the wavelength with wavelength-scale surface roughness"},{"ddc":["530"],"keyword":["tet_topic_scattering"],"language":[{"iso":"eng"}],"abstract":[{"text":"The physical optics approximations are derived from the Maxwell equations. The scattered field equations by Kirchhoff, Stratton-Chu, Kottler and Franz are compared and discussed. It is shown that in the case of faceted particles, these equations reduce to a sum of the diffraction integrals, where every diffraction integral is associated with one plane–parallel optical beam leaving a particle facet. In the far zone, these diffraction integrals correspond to the Fraunhofer diffraction patterns. The paper discusses the E-, M- and (E, M)-diffraction theories as applied to ice crystals of cirrus clouds. The comparison to the exact solution obtained by the discontinuous Galerkin time domain method shows that the Kirchhoff diffraction theory is preferable.","lang":"eng"}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_id":"3850","file_name":"2016 Grynko,Förstner_Light scattering by ice crystals of cirrus clouds comparison of the physical optics methods.pdf","file_size":3315958,"date_created":"2018-08-08T10:47:08Z","creator":"hclaudia","date_updated":"2018-08-08T10:47:08Z"}],"publication":"Journal of Quantitative Spectroscopy and Radiative Transfer","title":"Light scattering by ice crystals of cirrus clouds: comparison of the physical optics methods","publisher":"Elsevier BV","date_created":"2018-08-08T10:41:31Z","year":"2016","article_type":"original","file_date_updated":"2018-08-08T10:47:08Z","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"_id":"3849","user_id":"55706","department":[{"_id":"61"}],"status":"public","type":"journal_article","doi":"10.1016/j.jqsrt.2016.05.006","date_updated":"2022-01-06T06:59:45Z","author":[{"first_name":"Alexander V.","full_name":"Konoshonkin, Alexander V.","last_name":"Konoshonkin"},{"first_name":"Natalia V.","full_name":"Kustova, Natalia V.","last_name":"Kustova"},{"first_name":"Anatoli G.","last_name":"Borovoi","full_name":"Borovoi, Anatoli G."},{"full_name":"Grynko, Yevgen","id":"26059","last_name":"Grynko","first_name":"Yevgen"},{"id":"158","full_name":"Förstner, Jens","orcid":"0000-0001-7059-9862","last_name":"Förstner","first_name":"Jens"}],"volume":182,"citation":{"mla":"Konoshonkin, Alexander V., et al. “Light Scattering by Ice Crystals of Cirrus Clouds: Comparison of the Physical Optics Methods.” <i>Journal of Quantitative Spectroscopy and Radiative Transfer</i>, vol. 182, Elsevier BV, 2016, pp. 12–23, doi:<a href=\"https://doi.org/10.1016/j.jqsrt.2016.05.006\">10.1016/j.jqsrt.2016.05.006</a>.","short":"A.V. Konoshonkin, N.V. Kustova, A.G. Borovoi, Y. Grynko, J. Förstner, Journal of Quantitative Spectroscopy and Radiative Transfer 182 (2016) 12–23.","bibtex":"@article{Konoshonkin_Kustova_Borovoi_Grynko_Förstner_2016, title={Light scattering by ice crystals of cirrus clouds: comparison of the physical optics methods}, volume={182}, DOI={<a href=\"https://doi.org/10.1016/j.jqsrt.2016.05.006\">10.1016/j.jqsrt.2016.05.006</a>}, journal={Journal of Quantitative Spectroscopy and Radiative Transfer}, publisher={Elsevier BV}, author={Konoshonkin, Alexander V. and Kustova, Natalia V. and Borovoi, Anatoli G. and Grynko, Yevgen and Förstner, Jens}, year={2016}, pages={12–23} }","apa":"Konoshonkin, A. V., Kustova, N. V., Borovoi, A. G., Grynko, Y., &#38; Förstner, J. (2016). Light scattering by ice crystals of cirrus clouds: comparison of the physical optics methods. <i>Journal of Quantitative Spectroscopy and Radiative Transfer</i>, <i>182</i>, 12–23. <a href=\"https://doi.org/10.1016/j.jqsrt.2016.05.006\">https://doi.org/10.1016/j.jqsrt.2016.05.006</a>","chicago":"Konoshonkin, Alexander V., Natalia V. Kustova, Anatoli G. Borovoi, Yevgen Grynko, and Jens Förstner. “Light Scattering by Ice Crystals of Cirrus Clouds: Comparison of the Physical Optics Methods.” <i>Journal of Quantitative Spectroscopy and Radiative Transfer</i> 182 (2016): 12–23. <a href=\"https://doi.org/10.1016/j.jqsrt.2016.05.006\">https://doi.org/10.1016/j.jqsrt.2016.05.006</a>.","ieee":"A. V. Konoshonkin, N. V. Kustova, A. G. Borovoi, Y. Grynko, and J. Förstner, “Light scattering by ice crystals of cirrus clouds: comparison of the physical optics methods,” <i>Journal of Quantitative Spectroscopy and Radiative Transfer</i>, vol. 182, pp. 12–23, 2016.","ama":"Konoshonkin AV, Kustova NV, Borovoi AG, Grynko Y, Förstner J. Light scattering by ice crystals of cirrus clouds: comparison of the physical optics methods. <i>Journal of Quantitative Spectroscopy and Radiative Transfer</i>. 2016;182:12-23. doi:<a href=\"https://doi.org/10.1016/j.jqsrt.2016.05.006\">10.1016/j.jqsrt.2016.05.006</a>"},"intvolume":"       182","page":"12-23","publication_status":"published","publication_identifier":{"issn":["0022-4073"]},"has_accepted_license":"1"},{"language":[{"iso":"eng"}],"user_id":"82920","department":[{"_id":"600"}],"_id":"3880","status":"public","type":"conference","publication":"Ausgezeichnete Informatikdissertationen 2015","main_file_link":[{"url":"https://dl.gi.de/bitstream/handle/20.500.12116/4595/329.pdf?sequence=1"}],"title":"Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse","author":[{"full_name":"Wachsmuth, Henning","id":"3900","last_name":"Wachsmuth","first_name":"Henning"}],"date_created":"2018-08-11T16:16:00Z","date_updated":"2022-01-06T06:59:47Z","citation":{"short":"H. Wachsmuth, in: Ausgezeichnete Informatikdissertationen 2015, 2016, pp. 329–338.","mla":"Wachsmuth, Henning. “Pipelines Für Effiziente Und Robuste Ad-Hoc Textanalyse.” <i>Ausgezeichnete Informatikdissertationen 2015</i>, 2016, pp. 329–38.","bibtex":"@inproceedings{Wachsmuth_2016, title={Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse}, booktitle={Ausgezeichnete Informatikdissertationen 2015}, author={Wachsmuth, Henning}, year={2016}, pages={329–338} }","apa":"Wachsmuth, H. (2016). Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse. In <i>Ausgezeichnete Informatikdissertationen 2015</i> (pp. 329–338).","ama":"Wachsmuth H. Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse. In: <i>Ausgezeichnete Informatikdissertationen 2015</i>. ; 2016:329-338.","ieee":"H. Wachsmuth, “Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse,” in <i>Ausgezeichnete Informatikdissertationen 2015</i>, 2016, pp. 329–338.","chicago":"Wachsmuth, Henning. “Pipelines Für Effiziente Und Robuste Ad-Hoc Textanalyse.” In <i>Ausgezeichnete Informatikdissertationen 2015</i>, 329–38, 2016."},"page":"329-338","year":"2016","publication_identifier":{"isbn":["978-3-88579-975-7"]}},{"language":[{"iso":"eng"}],"ddc":["530"],"keyword":["tet_topic_plasmonics","tet_topic_polariton"],"publication":"Optics Express","file":[{"access_level":"open_access","file_id":"3885","file_name":"2016-02 Kou,Förstner_Discrete plasmonic solitons in graphene-coated nanowires arrays_optics express.pdf","file_size":2425722,"date_created":"2018-08-13T08:56:31Z","creator":"hclaudia","date_updated":"2018-08-21T10:43:44Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"e  study  the  discrete  soliton  formation  in  one-  and  two-\r\ndimensional arrays of nanowires coated with graphene monolayers. Highly \r\nconfined  solitons,  including  the  fundamental  and  the  higher-order  modes,  are  found  to  be  supported  by  the  proposed  structure  with  a  low  level  of  power  flow.  Numerical  analysis  reveals  that,  by  tuning  the  input  intensity  \r\nand Fermi energy, the beam diffraction, soliton dimension and propagation loss  can  be  fully  controlled  in  a  broad  range,  indicating  potential  values  of  the graphene-based solitons in nonlinear/active nanophotonic systems. ","lang":"eng"}],"date_created":"2018-08-13T08:45:53Z","publisher":"The Optical Society","title":"Discrete plasmonic solitons in graphene-coated nanowire arrays","issue":"5","year":"2016","user_id":"158","department":[{"_id":"61"}],"_id":"3884","extern":"1","file_date_updated":"2018-08-21T10:43:44Z","article_type":"original","type":"journal_article","status":"public","urn":"38843","author":[{"full_name":"Kou, Yao","last_name":"Kou","first_name":"Yao"},{"first_name":"Jens","last_name":"Förstner","orcid":"0000-0001-7059-9862","full_name":"Förstner, Jens","id":"158"}],"volume":24,"oa":"1","date_updated":"2022-01-06T06:59:48Z","doi":"10.1364/oe.24.004714","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["1094-4087"]},"citation":{"bibtex":"@article{Kou_Förstner_2016, title={Discrete plasmonic solitons in graphene-coated nanowire arrays}, volume={24}, DOI={<a href=\"https://doi.org/10.1364/oe.24.004714\">10.1364/oe.24.004714</a>}, number={5}, journal={Optics Express}, publisher={The Optical Society}, author={Kou, Yao and Förstner, Jens}, year={2016}, pages={4714} }","mla":"Kou, Yao, and Jens Förstner. “Discrete Plasmonic Solitons in Graphene-Coated Nanowire Arrays.” <i>Optics Express</i>, vol. 24, no. 5, The Optical Society, 2016, p. 4714, doi:<a href=\"https://doi.org/10.1364/oe.24.004714\">10.1364/oe.24.004714</a>.","short":"Y. Kou, J. Förstner, Optics Express 24 (2016) 4714.","apa":"Kou, Y., &#38; Förstner, J. (2016). Discrete plasmonic solitons in graphene-coated nanowire arrays. <i>Optics Express</i>, <i>24</i>(5), 4714. <a href=\"https://doi.org/10.1364/oe.24.004714\">https://doi.org/10.1364/oe.24.004714</a>","chicago":"Kou, Yao, and Jens Förstner. “Discrete Plasmonic Solitons in Graphene-Coated Nanowire Arrays.” <i>Optics Express</i> 24, no. 5 (2016): 4714. <a href=\"https://doi.org/10.1364/oe.24.004714\">https://doi.org/10.1364/oe.24.004714</a>.","ieee":"Y. Kou and J. Förstner, “Discrete plasmonic solitons in graphene-coated nanowire arrays,” <i>Optics Express</i>, vol. 24, no. 5, p. 4714, 2016.","ama":"Kou Y, Förstner J. Discrete plasmonic solitons in graphene-coated nanowire arrays. <i>Optics Express</i>. 2016;24(5):4714. doi:<a href=\"https://doi.org/10.1364/oe.24.004714\">10.1364/oe.24.004714</a>"},"intvolume":"        24","page":"4714"},{"language":[{"iso":"eng"}],"keyword":["tet_topic_shg","tet_topic_meta"],"ddc":["530"],"publication":"Applied Physics B","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"hclaudia","date_created":"2018-08-13T09:04:39Z","date_updated":"2018-08-13T09:04:39Z","file_name":"2016-03 Alberti,Linnenbank,Lindnen,Grynko,Förstner_The Role of Electromagnetic Interactions In Second Harmonic Generation From Plasmonic Metamaterials_Applied Physics B.pdf","access_level":"closed","file_id":"3887","file_size":863943}],"abstract":[{"text":" We report on second harmonic generation spectroscopy on a series of rectangular arrays of split-ring resonators. Within the  sample  series, the  lattice  constants are varied, but the area of the unit cell is kept ﬁxed. The SHG \r\nsignal intensity of the different arrays upon resonant excitation of the fundamental plasmonic mode  strongly depends \r\non the respective arrangement  of  the  split-ring  resonators. This ﬁnding can be explained by variations of  the electromagnetic  interactions  between the  split-ring resonators  in the different arrays. The experimental results are in agreement with  numerical calculations based  on the discontinuous Galerkin time-domain method. \r\n\r\n(PDF) The role of electromagnetic interactions.... Available from: https://www.researchgate.net/publication/297612326_The_role_of_electromagnetic_interactions_in_second_harmonic_generation_from_plasmonic_metamaterials [accessed Aug 13 2018].","lang":"eng"}],"date_created":"2018-08-13T08:59:27Z","publisher":"Springer Nature","title":"The role of electromagnetic interactions in second harmonic generation from plasmonic metamaterials","issue":"2","year":"2016","department":[{"_id":"61"}],"user_id":"55706","_id":"3886","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"file_date_updated":"2018-08-13T09:04:39Z","article_type":"original","type":"journal_article","status":"public","volume":122,"author":[{"first_name":"Julian","last_name":"Alberti","full_name":"Alberti, Julian"},{"full_name":"Linnenbank, Heiko","last_name":"Linnenbank","first_name":"Heiko"},{"first_name":"Stefan","full_name":"Linden, Stefan","last_name":"Linden"},{"last_name":"Grynko","id":"26059","full_name":"Grynko, Yevgen","first_name":"Yevgen"},{"id":"158","full_name":"Förstner, Jens","last_name":"Förstner","orcid":"0000-0001-7059-9862","first_name":"Jens"}],"date_updated":"2022-01-06T06:59:48Z","doi":"10.1007/s00340-015-6311-x","has_accepted_license":"1","publication_identifier":{"issn":["0946-2171","1432-0649"]},"publication_status":"published","intvolume":"       122","page":"45-50","citation":{"chicago":"Alberti, Julian, Heiko Linnenbank, Stefan Linden, Yevgen Grynko, and Jens Förstner. “The Role of Electromagnetic Interactions in Second Harmonic Generation from Plasmonic Metamaterials.” <i>Applied Physics B</i> 122, no. 2 (2016): 45–50. <a href=\"https://doi.org/10.1007/s00340-015-6311-x\">https://doi.org/10.1007/s00340-015-6311-x</a>.","ieee":"J. Alberti, H. Linnenbank, S. Linden, Y. Grynko, and J. Förstner, “The role of electromagnetic interactions in second harmonic generation from plasmonic metamaterials,” <i>Applied Physics B</i>, vol. 122, no. 2, pp. 45–50, 2016.","ama":"Alberti J, Linnenbank H, Linden S, Grynko Y, Förstner J. The role of electromagnetic interactions in second harmonic generation from plasmonic metamaterials. <i>Applied Physics B</i>. 2016;122(2):45-50. doi:<a href=\"https://doi.org/10.1007/s00340-015-6311-x\">10.1007/s00340-015-6311-x</a>","short":"J. Alberti, H. Linnenbank, S. Linden, Y. Grynko, J. Förstner, Applied Physics B 122 (2016) 45–50.","bibtex":"@article{Alberti_Linnenbank_Linden_Grynko_Förstner_2016, title={The role of electromagnetic interactions in second harmonic generation from plasmonic metamaterials}, volume={122}, DOI={<a href=\"https://doi.org/10.1007/s00340-015-6311-x\">10.1007/s00340-015-6311-x</a>}, number={2}, journal={Applied Physics B}, publisher={Springer Nature}, author={Alberti, Julian and Linnenbank, Heiko and Linden, Stefan and Grynko, Yevgen and Förstner, Jens}, year={2016}, pages={45–50} }","mla":"Alberti, Julian, et al. “The Role of Electromagnetic Interactions in Second Harmonic Generation from Plasmonic Metamaterials.” <i>Applied Physics B</i>, vol. 122, no. 2, Springer Nature, 2016, pp. 45–50, doi:<a href=\"https://doi.org/10.1007/s00340-015-6311-x\">10.1007/s00340-015-6311-x</a>.","apa":"Alberti, J., Linnenbank, H., Linden, S., Grynko, Y., &#38; Förstner, J. (2016). The role of electromagnetic interactions in second harmonic generation from plasmonic metamaterials. <i>Applied Physics B</i>, <i>122</i>(2), 45–50. <a href=\"https://doi.org/10.1007/s00340-015-6311-x\">https://doi.org/10.1007/s00340-015-6311-x</a>"}},{"_id":"2898","department":[{"_id":"64"}],"user_id":"25078","type":"mastersthesis","status":"public","date_updated":"2022-01-06T06:58:42Z","author":[{"last_name":"Weis","full_name":"Weis, Eduard","first_name":"Eduard"}],"date_created":"2018-05-25T09:43:39Z","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"title":"Searchable Encryption","year":"2016","citation":{"chicago":"Weis, Eduard. <i>Searchable Encryption</i>, 2016.","ieee":"E. Weis, <i>Searchable Encryption</i>. 2016.","ama":"Weis E. <i>Searchable Encryption</i>.; 2016.","short":"E. Weis, Searchable Encryption, 2016.","bibtex":"@book{Weis_2016, title={Searchable Encryption}, author={Weis, Eduard}, year={2016} }","mla":"Weis, Eduard. <i>Searchable Encryption</i>. 2016.","apa":"Weis, E. (2016). <i>Searchable Encryption</i>."}},{"language":[{"iso":"ger"}],"_id":"28995","user_id":"50923","series_title":"7-32","department":[{"_id":"462"}],"editor":[{"first_name":"Birgit","full_name":"Eickelmann, Birgit","last_name":"Eickelmann"},{"last_name":"Gerick","full_name":"Gerick, Julia","first_name":"Julia"},{"first_name":"Kerstin","last_name":"Drossel","full_name":"Drossel, Kerstin"},{"first_name":"Wilfried","last_name":"Bos","full_name":"Bos, Wilfried"}],"status":"public","type":"book_chapter","publication":"ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen","title":"Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven","date_updated":"2022-01-06T06:58:43Z","publisher":"Waxmann","author":[{"full_name":"Eickelmann, Birgit","id":"40387","last_name":"Eickelmann","first_name":"Birgit"},{"first_name":"Julia","full_name":"Gerick, Julia","last_name":"Gerick"},{"last_name":"Drossel","id":"48921","full_name":"Drossel, Kerstin","first_name":"Kerstin"},{"first_name":"Wilfried","last_name":"Bos","full_name":"Bos, Wilfried"}],"date_created":"2021-12-15T17:24:17Z","year":"2016","place":"Münster","citation":{"mla":"Eickelmann, Birgit, et al. “Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven.” <i>ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen</i>, edited by Birgit Eickelmann et al., Waxmann, 2016.","bibtex":"@inbook{Eickelmann_Gerick_Drossel_Bos_2016, place={Münster}, series={7-32}, title={Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven}, booktitle={ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen}, publisher={Waxmann}, author={Eickelmann, Birgit and Gerick, Julia and Drossel, Kerstin and Bos, Wilfried}, editor={Eickelmann, Birgit and Gerick, Julia and Drossel, Kerstin and Bos, Wilfried}, year={2016}, collection={7-32} }","short":"B. Eickelmann, J. Gerick, K. Drossel, W. Bos, in: B. Eickelmann, J. Gerick, K. Drossel, W. Bos (Eds.), ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen, Waxmann, Münster, 2016.","apa":"Eickelmann, B., Gerick, J., Drossel, K., &#38; Bos, W. (2016). Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven. In B. Eickelmann, J. Gerick, K. Drossel, &#38; W. Bos (Eds.), <i>ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen</i>. Waxmann.","chicago":"Eickelmann, Birgit, Julia Gerick, Kerstin Drossel, and Wilfried Bos. “Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven.” In <i>ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen</i>, edited by Birgit Eickelmann, Julia Gerick, Kerstin Drossel, and Wilfried Bos. 7-32. Münster: Waxmann, 2016.","ieee":"B. Eickelmann, J. Gerick, K. Drossel, and W. Bos, “Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven,” in <i>ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen</i>, B. Eickelmann, J. Gerick, K. Drossel, and W. Bos, Eds. Münster: Waxmann, 2016.","ama":"Eickelmann B, Gerick J, Drossel K, Bos W. Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven. In: Eickelmann B, Gerick J, Drossel K, Bos W, eds. <i>ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen</i>. 7-32. Waxmann; 2016."}},{"user_id":"25078","department":[{"_id":"64"}],"project":[{"name":"Securing the Financial Cloud","_id":"43"}],"_id":"2947","type":"conference","publication":"2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)","status":"public","date_created":"2018-05-29T11:25:43Z","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"last_name":"Günther","full_name":"Günther, Peter","first_name":"Peter"}],"publisher":"IEEE","date_updated":"2022-01-06T06:58:48Z","doi":"10.1109/fdtc.2015.17","title":"Singular Curve Point Decompression Attack","publication_status":"published","publication_identifier":{"isbn":["9781467375795"]},"citation":{"ama":"Blömer J, Günther P. Singular Curve Point Decompression Attack. In: <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/fdtc.2015.17\">10.1109/fdtc.2015.17</a>","ieee":"J. Blömer and P. Günther, “Singular Curve Point Decompression Attack,” in <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>, 2016.","chicago":"Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.” In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/fdtc.2015.17\">https://doi.org/10.1109/fdtc.2015.17</a>.","apa":"Blömer, J., &#38; Günther, P. (2016). Singular Curve Point Decompression Attack. In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE. <a href=\"https://doi.org/10.1109/fdtc.2015.17\">https://doi.org/10.1109/fdtc.2015.17</a>","bibtex":"@inproceedings{Blömer_Günther_2016, title={Singular Curve Point Decompression Attack}, DOI={<a href=\"https://doi.org/10.1109/fdtc.2015.17\">10.1109/fdtc.2015.17</a>}, booktitle={2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)}, publisher={IEEE}, author={Blömer, Johannes and Günther, Peter}, year={2016} }","mla":"Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.” <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/fdtc.2015.17\">10.1109/fdtc.2015.17</a>.","short":"J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), IEEE, 2016."},"year":"2016"},{"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319328584","9783319328591"]},"place":"Cham","year":"2016","citation":{"bibtex":"@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>}, booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016}, pages={151–165} }","short":"P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.","mla":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” <i>Mathematical Aspects of Computer and Information Sciences</i>, Springer International Publishing, 2016, pp. 151–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>.","apa":"Günther, P., &#38; Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In <i>Mathematical Aspects of Computer and Information Sciences</i> (pp. 151–165). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>","ama":"Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: <i>Mathematical Aspects of Computer and Information Sciences</i>. Cham: Springer International Publishing; 2016:151-165. doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">10.1007/978-3-319-32859-1_13</a>","ieee":"P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in <i>Mathematical Aspects of Computer and Information Sciences</i>, Cham: Springer International Publishing, 2016, pp. 151–165.","chicago":"Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” In <i>Mathematical Aspects of Computer and Information Sciences</i>, 151–65. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_13\">https://doi.org/10.1007/978-3-319-32859-1_13</a>."},"page":"151-165","date_updated":"2022-01-06T06:58:48Z","publisher":"Springer International Publishing","date_created":"2018-05-29T11:26:56Z","author":[{"last_name":"Günther","full_name":"Günther, Peter","first_name":"Peter"},{"full_name":"Krummel, Volker","last_name":"Krummel","first_name":"Volker"}],"title":"Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures","doi":"10.1007/978-3-319-32859-1_13","type":"book_chapter","publication":"Mathematical Aspects of Computer and Information Sciences","status":"public","project":[{"_id":"43","name":"Securing the Financial Cloud"}],"_id":"2948","user_id":"25078","department":[{"_id":"64"}]},{"date_updated":"2022-01-06T06:58:49Z","publisher":"Springer International Publishing","date_created":"2018-06-04T12:22:40Z","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"last_name":"Lammersen","full_name":"Lammersen, Christiane","first_name":"Christiane"},{"full_name":"Schmidt, Melanie","last_name":"Schmidt","first_name":"Melanie"},{"full_name":"Sohler, Christian","last_name":"Sohler","first_name":"Christian"}],"title":"Theoretical Analysis of the k-Means Algorithm – A Survey","doi":"10.1007/978-3-319-49487-6_3","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319494869","9783319494876"]},"publication_status":"published","place":"Cham","year":"2016","page":"81-116","citation":{"ieee":"J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer International Publishing, 2016, pp. 81–116.","chicago":"Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>.","ama":"Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International Publishing; 2016:81-116. doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>","apa":"Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i> (pp. 81–116). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">https://doi.org/10.1007/978-3-319-49487-6_3</a>","bibtex":"@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical Analysis of the k-Means Algorithm – A Survey}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>}, booktitle={Algorithm Engineering}, publisher={Springer International Publishing}, author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}, year={2016}, pages={81–116} }","short":"J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.","mla":"Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016, pp. 81–116, doi:<a href=\"https://doi.org/10.1007/978-3-319-49487-6_3\">10.1007/978-3-319-49487-6_3</a>."},"_id":"2968","department":[{"_id":"64"}],"user_id":"25078","publication":"Algorithm Engineering","type":"book_chapter","status":"public"},{"type":"preprint","status":"public","_id":"2969","user_id":"25078","department":[{"_id":"64"}],"year":"2016","citation":{"apa":"Blömer, J., Brauer, S., &#38; Bujna, K. (2016). Hard-Clustering with Gaussian Mixture Models. Computing Research Repository.","short":"J. Blömer, S. Brauer, K. Bujna, (2016).","mla":"Blömer, Johannes, et al. <i>Hard-Clustering with Gaussian Mixture Models</i>. Computing Research Repository, 2016.","bibtex":"@article{Blömer_Brauer_Bujna_2016, title={Hard-Clustering with Gaussian Mixture Models}, publisher={Computing Research Repository}, author={Blömer, Johannes and Brauer, Sascha and Bujna, Kathrin}, year={2016} }","ama":"Blömer J, Brauer S, Bujna K. Hard-Clustering with Gaussian Mixture Models. 2016.","ieee":"J. Blömer, S. Brauer, and K. Bujna, “Hard-Clustering with Gaussian Mixture Models.” Computing Research Repository, 2016.","chicago":"Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Hard-Clustering with Gaussian Mixture Models.” Computing Research Repository, 2016."},"date_updated":"2022-01-06T06:58:49Z","publisher":"Computing Research Repository","oa":"1","date_created":"2018-06-04T12:26:51Z","author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"last_name":"Brauer","id":"13291","full_name":"Brauer, Sascha","first_name":"Sascha"},{"first_name":"Kathrin","last_name":"Bujna","full_name":"Bujna, Kathrin"}],"title":"Hard-Clustering with Gaussian Mixture Models","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1603.06478"}]},{"year":"2016","place":"Cham","citation":{"short":"J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.","bibtex":"@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian Mixture Models}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>}, booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016}, pages={296–308} }","mla":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International Publishing, 2016, pp. 296–308, doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>.","apa":"Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>","ieee":"J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International Publishing, 2016, pp. 296–308.","chicago":"Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham: Springer International Publishing, 2016. <a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">https://doi.org/10.1007/978-3-319-31750-2_24</a>.","ama":"Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances in Knowledge Discovery and Data Mining</i>. Cham: Springer International Publishing; 2016:296-308. doi:<a href=\"https://doi.org/10.1007/978-3-319-31750-2_24\">10.1007/978-3-319-31750-2_24</a>"},"page":"296-308","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319317496","9783319317502"]},"title":"Adaptive Seeding for Gaussian Mixture Models","doi":"10.1007/978-3-319-31750-2_24","date_updated":"2022-01-06T06:58:49Z","publisher":"Springer International Publishing","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"full_name":"Bujna, Kathrin","last_name":"Bujna","first_name":"Kathrin"}],"date_created":"2018-06-04T12:27:21Z","status":"public","type":"book_chapter","publication":"Advances in Knowledge Discovery and Data Mining","_id":"2970","user_id":"25078","department":[{"_id":"64"}]},{"title":"Effizienz und Sicherheit paarungsbasierter Kryptographie","date_created":"2018-06-05T07:21:25Z","author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"last_name":"Günther","full_name":"Günther, Peter","first_name":"Peter"}],"date_updated":"2022-01-06T06:58:49Z","publisher":"Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops","citation":{"ieee":"J. Blömer and P. Günther, <i>Effizienz und Sicherheit paarungsbasierter Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.","chicago":"Blömer, Johannes, and Peter Günther. <i>Effizienz Und Sicherheit Paarungsbasierter Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.","ama":"Blömer J, Günther P. <i>Effizienz Und Sicherheit Paarungsbasierter Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops; 2016.","apa":"Blömer, J., &#38; Günther, P. (2016). <i>Effizienz und Sicherheit paarungsbasierter Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops.","short":"J. Blömer, P. Günther, Effizienz Und Sicherheit Paarungsbasierter Kryptographie, Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.","mla":"Blömer, Johannes, and Peter Günther. <i>Effizienz Und Sicherheit Paarungsbasierter Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.","bibtex":"@book{Blömer_Günther_2016, title={Effizienz und Sicherheit paarungsbasierter Kryptographie}, publisher={Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops}, author={Blömer, Johannes and Günther, Peter}, year={2016} }"},"year":"2016","publication_status":"published","department":[{"_id":"64"}],"user_id":"25078","_id":"2971","status":"public","type":"report"},{"ddc":["040"],"language":[{"iso":"eng"}],"file":[{"file_id":"5138","access_level":"closed","file_name":"On Non-Cooperative Foundation and Implementation of the Nash....pdf","file_size":332414,"date_created":"2018-10-31T08:49:27Z","creator":"stela","date_updated":"2018-10-31T08:49:27Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"publication":"Journal of Mechanism and Institution Design","title":"On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein's Game","publisher":"The Society for the Promotion of Mechanism and Institution Design","date_created":"2018-06-07T08:53:37Z","year":"2016","issue":"1","file_date_updated":"2018-10-31T08:49:27Z","extern":"1","_id":"3106","user_id":"65453","status":"public","type":"journal_article","doi":"10.22574/jmid.2016.12.003","date_updated":"2022-01-06T06:58:56Z","volume":1,"author":[{"first_name":"Papatya","full_name":"Duman, Papatya","id":"72752","last_name":"Duman"},{"full_name":"Trockel, Walter","last_name":"Trockel","first_name":"Walter"}],"page":"83-106","intvolume":"         1","citation":{"ama":"Duman P, Trockel W. On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game. <i>Journal of Mechanism and Institution Design</i>. 2016;1(1):83-106. doi:<a href=\"https://doi.org/10.22574/jmid.2016.12.003\">10.22574/jmid.2016.12.003</a>","ieee":"P. Duman and W. Trockel, “On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game,” <i>Journal of Mechanism and Institution Design</i>, vol. 1, no. 1, pp. 83–106, 2016.","chicago":"Duman, Papatya, and Walter Trockel. “On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game.” <i>Journal of Mechanism and Institution Design</i> 1, no. 1 (2016): 83–106. <a href=\"https://doi.org/10.22574/jmid.2016.12.003\">https://doi.org/10.22574/jmid.2016.12.003</a>.","bibtex":"@article{Duman_Trockel_2016, title={On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game}, volume={1}, DOI={<a href=\"https://doi.org/10.22574/jmid.2016.12.003\">10.22574/jmid.2016.12.003</a>}, number={1}, journal={Journal of Mechanism and Institution Design}, publisher={The Society for the Promotion of Mechanism and Institution Design}, author={Duman, Papatya and Trockel, Walter}, year={2016}, pages={83–106} }","mla":"Duman, Papatya, and Walter Trockel. “On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game.” <i>Journal of Mechanism and Institution Design</i>, vol. 1, no. 1, The Society for the Promotion of Mechanism and Institution Design, 2016, pp. 83–106, doi:<a href=\"https://doi.org/10.22574/jmid.2016.12.003\">10.22574/jmid.2016.12.003</a>.","short":"P. Duman, W. Trockel, Journal of Mechanism and Institution Design 1 (2016) 83–106.","apa":"Duman, P., &#38; Trockel, W. (2016). On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game. <i>Journal of Mechanism and Institution Design</i>, <i>1</i>(1), 83–106. <a href=\"https://doi.org/10.22574/jmid.2016.12.003\">https://doi.org/10.22574/jmid.2016.12.003</a>"},"publication_identifier":{"issn":["2399-844X","2399-8458"]},"has_accepted_license":"1","publication_status":"published"},{"extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3112","status":"public","type":"journal_article","publication":"Des. Codes Cryptography","doi":"10.1007/s10623-015-0062-x","title":"Tightly secure signatures and public-key encryption","date_created":"2018-06-07T09:12:15Z","author":[{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"last_name":"Jager","full_name":"Jager, Tibor","id":"64669","first_name":"Tibor"}],"date_updated":"2022-01-06T06:58:56Z","citation":{"mla":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” <i>Des. Codes Cryptography</i>, no. 1, 2016, pp. 29--61, doi:<a href=\"https://doi.org/10.1007/s10623-015-0062-x\">10.1007/s10623-015-0062-x</a>.","short":"D. Hofheinz, T. Jager, Des. Codes Cryptography (2016) 29--61.","bibtex":"@article{Hofheinz_Jager_2016, title={Tightly secure signatures and public-key encryption}, DOI={<a href=\"https://doi.org/10.1007/s10623-015-0062-x\">10.1007/s10623-015-0062-x</a>}, number={1}, journal={Des. Codes Cryptography}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={29--61} }","apa":"Hofheinz, D., &#38; Jager, T. (2016). Tightly secure signatures and public-key encryption. <i>Des. Codes Cryptography</i>, (1), 29--61. <a href=\"https://doi.org/10.1007/s10623-015-0062-x\">https://doi.org/10.1007/s10623-015-0062-x</a>","chicago":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” <i>Des. Codes Cryptography</i>, no. 1 (2016): 29--61. <a href=\"https://doi.org/10.1007/s10623-015-0062-x\">https://doi.org/10.1007/s10623-015-0062-x</a>.","ieee":"D. Hofheinz and T. Jager, “Tightly secure signatures and public-key encryption,” <i>Des. Codes Cryptography</i>, no. 1, pp. 29--61, 2016.","ama":"Hofheinz D, Jager T. Tightly secure signatures and public-key encryption. <i>Des Codes Cryptography</i>. 2016;(1):29--61. doi:<a href=\"https://doi.org/10.1007/s10623-015-0062-x\">10.1007/s10623-015-0062-x</a>"},"page":"29--61","year":"2016","issue":"1"},{"doi":"10.1049/iet-ifs.2015.0507","title":"Selective opening security of practical public-key encryption schemes","date_created":"2018-06-07T09:12:50Z","author":[{"first_name":"Felix","full_name":"Heuer, Felix","last_name":"Heuer"},{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"full_name":"Schäge, Sven","last_name":"Schäge","first_name":"Sven"},{"full_name":"Kiltz, Eike","last_name":"Kiltz","first_name":"Eike"}],"date_updated":"2022-01-06T06:58:56Z","citation":{"ama":"Heuer F, Jager T, Schäge S, Kiltz E. Selective opening security of practical public-key encryption schemes. <i>IET Information Security</i>. 2016;(6):304--318. doi:<a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">10.1049/iet-ifs.2015.0507</a>","ieee":"F. Heuer, T. Jager, S. Schäge, and E. Kiltz, “Selective opening security of practical public-key encryption schemes,” <i>IET Information Security</i>, no. 6, pp. 304--318, 2016.","chicago":"Heuer, Felix, Tibor Jager, Sven Schäge, and Eike Kiltz. “Selective Opening Security of Practical Public-Key Encryption Schemes.” <i>IET Information Security</i>, no. 6 (2016): 304--318. <a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">https://doi.org/10.1049/iet-ifs.2015.0507</a>.","short":"F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016) 304--318.","bibtex":"@article{Heuer_Jager_Schäge_Kiltz_2016, title={Selective opening security of practical public-key encryption schemes}, DOI={<a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">10.1049/iet-ifs.2015.0507</a>}, number={6}, journal={IET Information Security}, author={Heuer, Felix and Jager, Tibor and Schäge, Sven and Kiltz, Eike}, year={2016}, pages={304--318} }","mla":"Heuer, Felix, et al. “Selective Opening Security of Practical Public-Key Encryption Schemes.” <i>IET Information Security</i>, no. 6, 2016, pp. 304--318, doi:<a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">10.1049/iet-ifs.2015.0507</a>.","apa":"Heuer, F., Jager, T., Schäge, S., &#38; Kiltz, E. (2016). Selective opening security of practical public-key encryption schemes. <i>IET Information Security</i>, (6), 304--318. <a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">https://doi.org/10.1049/iet-ifs.2015.0507</a>"},"page":"304--318","year":"2016","issue":"6","extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3113","status":"public","type":"journal_article","publication":"IET Information Security"},{"page":"62--82","citation":{"mla":"Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3, 2016, pp. 62--82.","bibtex":"@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}, number={3}, journal={PoPETs}, author={Jager, Tibor and Rupp, Andy}, year={2016}, pages={62--82} }","short":"T. Jager, A. Rupp, PoPETs (2016) 62--82.","apa":"Jager, T., &#38; Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. <i>PoPETs</i>, (3), 62--82.","ama":"Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. <i>PoPETs</i>. 2016;(3):62--82.","chicago":"Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3 (2016): 62--82.","ieee":"T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” <i>PoPETs</i>, no. 3, pp. 62--82, 2016."},"year":"2016","issue":"3","title":"Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way","date_created":"2018-06-07T09:13:15Z","author":[{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"},{"first_name":"Andy","full_name":"Rupp, Andy","last_name":"Rupp"}],"date_updated":"2022-01-06T06:58:56Z","status":"public","publication":"PoPETs","type":"journal_article","extern":"1","department":[{"_id":"558"}],"user_id":"38235","_id":"3114"},{"type":"conference","publication":"Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II","status":"public","user_id":"38235","department":[{"_id":"558"}],"_id":"3115","extern":"1","citation":{"chicago":"Hofheinz, Dennis, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, and Mark Zhandry. “How to Generate and Use Universal Samplers.” In <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>, 715--744, 2016. <a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">https://doi.org/10.1007/978-3-662-53890-6_24</a>.","ieee":"D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How to Generate and Use Universal Samplers,” in <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>, 2016, pp. 715--744.","ama":"Hofheinz D, Jager T, Khurana D, Sahai A, Waters B, Zhandry M. How to Generate and Use Universal Samplers. In: <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>. ; 2016:715--744. doi:<a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">10.1007/978-3-662-53890-6_24</a>","apa":"Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B., &#38; Zhandry, M. (2016). How to Generate and Use Universal Samplers. In <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i> (pp. 715--744). <a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">https://doi.org/10.1007/978-3-662-53890-6_24</a>","mla":"Hofheinz, Dennis, et al. “How to Generate and Use Universal Samplers.” <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>, 2016, pp. 715--744, doi:<a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">10.1007/978-3-662-53890-6_24</a>.","bibtex":"@inproceedings{Hofheinz_Jager_Khurana_Sahai_Waters_Zhandry_2016, title={How to Generate and Use Universal Samplers}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">10.1007/978-3-662-53890-6_24</a>}, booktitle={Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark}, year={2016}, pages={715--744} }","short":"D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744."},"page":"715--744","year":"2016","date_created":"2018-06-07T09:13:48Z","author":[{"first_name":"Dennis","last_name":"Hofheinz","full_name":"Hofheinz, Dennis"},{"last_name":"Jager","full_name":"Jager, Tibor","id":"64669","first_name":"Tibor"},{"last_name":"Khurana","full_name":"Khurana, Dakshita","first_name":"Dakshita"},{"first_name":"Amit","full_name":"Sahai, Amit","last_name":"Sahai"},{"last_name":"Waters","full_name":"Waters, Brent","first_name":"Brent"},{"first_name":"Mark","last_name":"Zhandry","full_name":"Zhandry, Mark"}],"date_updated":"2022-01-06T06:58:57Z","doi":"10.1007/978-3-662-53890-6_24","title":"How to Generate and Use Universal Samplers"},{"_id":"3116","department":[{"_id":"558"}],"user_id":"38235","extern":"1","publication":"Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings","type":"conference","status":"public","date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:14:34Z","author":[{"full_name":"Horst, Matthias","last_name":"Horst","first_name":"Matthias"},{"full_name":"Grothe, Martin","last_name":"Grothe","first_name":"Martin"},{"full_name":"Jager, Tibor","id":"64669","last_name":"Jager","first_name":"Tibor"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"title":"Breaking PPTP VPNs via RADIUS Encryption","doi":"10.1007/978-3-319-48965-0_10","year":"2016","page":"159--175","citation":{"chicago":"Horst, Matthias, Martin Grothe, Tibor Jager, and Jörg Schwenk. “Breaking PPTP VPNs via RADIUS Encryption.” In <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>, 159--175, 2016. <a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">https://doi.org/10.1007/978-3-319-48965-0_10</a>.","ieee":"M. Horst, M. Grothe, T. Jager, and J. Schwenk, “Breaking PPTP VPNs via RADIUS Encryption,” in <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175.","ama":"Horst M, Grothe M, Jager T, Schwenk J. Breaking PPTP VPNs via RADIUS Encryption. In: <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>. ; 2016:159--175. doi:<a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">10.1007/978-3-319-48965-0_10</a>","apa":"Horst, M., Grothe, M., Jager, T., &#38; Schwenk, J. (2016). Breaking PPTP VPNs via RADIUS Encryption. In <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i> (pp. 159--175). <a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">https://doi.org/10.1007/978-3-319-48965-0_10</a>","mla":"Horst, Matthias, et al. “Breaking PPTP VPNs via RADIUS Encryption.” <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175, doi:<a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">10.1007/978-3-319-48965-0_10</a>.","bibtex":"@inproceedings{Horst_Grothe_Jager_Schwenk_2016, title={Breaking PPTP VPNs via RADIUS Encryption}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">10.1007/978-3-319-48965-0_10</a>}, booktitle={Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings}, author={Horst, Matthias and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}, year={2016}, pages={159--175} }","short":"M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175."}},{"extern":"1","_id":"3117","department":[{"_id":"558"}],"user_id":"38235","status":"public","publication":"Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II","type":"conference","title":"On the Impossibility of Tight Cryptographic Reductions","doi":"10.1007/978-3-662-49896-5_10","date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:15:15Z","author":[{"first_name":"Christoph","full_name":"Bader, Christoph","last_name":"Bader"},{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"Yong","full_name":"Li, Yong","last_name":"Li"},{"last_name":"Schäge","full_name":"Schäge, Sven","first_name":"Sven"}],"year":"2016","page":"273--304","citation":{"short":"C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.","bibtex":"@inproceedings{Bader_Jager_Li_Schäge_2016, title={On the Impossibility of Tight Cryptographic Reductions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">10.1007/978-3-662-49896-5_10</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II}, author={Bader, Christoph and Jager, Tibor and Li, Yong and Schäge, Sven}, year={2016}, pages={273--304} }","mla":"Bader, Christoph, et al. “On the Impossibility of Tight Cryptographic Reductions.” <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304, doi:<a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">10.1007/978-3-662-49896-5_10</a>.","apa":"Bader, C., Jager, T., Li, Y., &#38; Schäge, S. (2016). On the Impossibility of Tight Cryptographic Reductions. In <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i> (pp. 273--304). <a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">https://doi.org/10.1007/978-3-662-49896-5_10</a>","ama":"Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic Reductions. In: <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>. ; 2016:273--304. doi:<a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">10.1007/978-3-662-49896-5_10</a>","ieee":"C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic Reductions,” in <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304.","chicago":"Bader, Christoph, Tibor Jager, Yong Li, and Sven Schäge. “On the Impossibility of Tight Cryptographic Reductions.” In <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 273--304, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">https://doi.org/10.1007/978-3-662-49896-5_10</a>."}}]
