SFB 901 - Robustheit und Sicherheit (C01)

Project Period: 2011-07-01 – 2023-06-30
Externally Funded
Alternative Name
SFB 901 - Robustness and Security (C01)
Acronym
SFB 901 - C1
Coordinator
Ulf-Peter Schroeder
Principal Investigator
Johannes Blömer, Christian Scheideler, Prof. Dr. Tibor Jager, Prof. Dr. Christoph Sorge
Department(s)
Fakultät für Elektrotechnik, Informatik und Mathematik -> Institut für Informatik -> Codes und Kryptographie
Theorie verteilter Systeme
IT-Sicherheit (bis 2019)
Description

Teilprojekt C1 befasst sich mit der Robustheit und Sicherheit von OTF-Systemen. Die Arbeit der zweiten Förderperiode wird auf eine vertrauenswürdige Verwaltung von Ressourcen ausgedehnt und zusätzlich die Robustheit von heterogenen Systemen untersucht. Es werden Zugriffskontrollsysteme entwickelt, welche durch Verfahren wie Multiparty Computation und Blockchains die Dezentralisierung von OTF Computing ermöglichen, sowie kryptographische Techniken erforscht, welche die speziellen Sicherheitsanforderungen von OTF Anwendungen beweisbar erfüllen.

Grant Number
Funding Organisation
Deutsche Forschungsgemeinschaft

150 Publications

2015 | Conference Paper | LibreCat-ID: 253
Short Group Signatures with Distributed Traceability
J. Blömer, J. Juhnke, N. Löken, in: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
LibreCat | Files available | DOI
 
2020 | Conference Paper | LibreCat-ID: 19551
Efficient Forward-Secure Threshold Public Key Encryption
R. Kurek, in: J. K. Liu, H. Cui (Eds.), Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, Springer, 2020, pp. 330–349.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19553
Efficient Forward-Secure Threshold Signatures
R. Kurek, in: K. Aoki, A. Kanaoka (Eds.), Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings, Springer, 2020, pp. 239–260.
LibreCat | DOI
 
2015 | Journal Article | LibreCat-ID: 284
IRIS: A Robust Information System Against Insider DoS Attacks
M. Eikel, C. Scheideler, Transactions on Parallel Computing (2015) 18:1--18:33.
LibreCat | Files available | DOI
 
2015 | Bachelorsthesis | LibreCat-ID: 286
Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup
B. Kalde, Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup, Universität Paderborn, 2015.
LibreCat
 
2018 | Conference Paper | LibreCat-ID: 2862 | OA
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
J. Blömer, F. Eidens, J. Juhnke, in: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, Cham, 2018, pp. 470–490.
LibreCat | Files available | DOI | Download (ext.)
 
2020 | Dissertation | LibreCat-ID: 24710
Efficient Cryptographic Constructions with Strong Security Guarantees
R. Kurek, Efficient Cryptographic Constructions with Strong Security Guarantees, 2020.
LibreCat | Files available
 
2015 | Bachelorsthesis | LibreCat-ID: 261
Protokolle zur authentifizierten Schüsselvereinbarung
T. Eisenhofer, Protokolle zur authentifizierten Schüsselvereinbarung, Universität Paderborn, 2015.
LibreCat
 
2018 | Journal Article | LibreCat-ID: 2685
Voronoi Cells of Lattices with Respect to Arbitrary Norms
J. Blömer, K. Kohn, SIAM Journal on Applied Algebra and Geometry. 2 (2018) 314–338.
LibreCat | Files available | DOI
 
2015 | Mastersthesis | LibreCat-ID: 321
Anonymous credential system based on q-Strong Diffie-Hellman Assumption
F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Conference Paper | LibreCat-ID: 322 | OA
Anonymous and Publicly Linkable Reputation Systems
J. Blömer, J. Juhnke, C. Kolb, in: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat | Files available | DOI | Download (ext.)
 
2015 | Mastersthesis | LibreCat-ID: 325
A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Bachelorsthesis | LibreCat-ID: 326
A group signature scheme based on the LSRW assumption
F. Heihoff, A Group Signature Scheme Based on the LSRW Assumption, Universität Paderborn, 2015.
LibreCat
 
2018 | Conference Paper | LibreCat-ID: 3265 | OA
Fully-Featured Anonymous Credentials with Reputation System
K. Bemmann, J. Blömer, J. Bobolz, H. Bröcher, D.P. Diemert, F. Eidens, L. Eilers, J.F. Haltermann, J. Juhnke, B. Otour, L.A. Porzenheim, S. Pukrop, E. Schilling, M. Schlichtig, M. Stienemeier, in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, New York, NY, USA, n.d.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 3422
Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary
P. Robinson, C. Scheideler, A. Setzer, in: Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), n.d.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 346
Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services
S. Brangewitz, A. Jungmann, R. Petrlic, M.C. Platenius, in: Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2014, pp. 49–57.
LibreCat | Files available
 
2014 | Report | LibreCat-ID: 349
The Legal Classification of Identity-Based Signatures
C. Sorge, The Legal Classification of Identity-Based Signatures, 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 355
Tampering attacks in pairing-based cryptography
J. Blömer, P. Günther, G. Liske, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 366
Security and Privacy Challenges in On-The-Fly Computing
R. Petrlic, A. Jungmann, M.C. Platenius, W. Schäfer, C. Sorge, in: Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014), 2014, pp. 131–142.
LibreCat | Files available
 
2014 | Bachelorsthesis | LibreCat-ID: 369
RSA-Full Domain Hash Revisited
T. Rath, RSA-Full Domain Hash Revisited, Universität Paderborn, 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 371
RoBuSt: A Crash-Failure-Resistant Distributed Storage System
C. Scheideler, A. Setzer, M. Eikel, in: Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 378
Re-Chord: A Self-stabilizing Chord Overlay Network
S. Kniesburges, A. Koutsopoulos, C. Scheideler, Theory of Computing Systems (2014) 591–612.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 384
Privacy-Preserving Reputation Management
R. Petrlic, S. Lutters, C. Sorge, in: Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–1718.
LibreCat | Files available | DOI
 
2014 | Dissertation | LibreCat-ID: 385
Privacy-Preserving Multiparty Digital Rights Management
R. Petrlic, Privacy-Preserving Multiparty Digital Rights Management, Universität Paderborn, 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 386
Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
R. Petrlic, C. Sorge, in: Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 387
Principles of Robust Medium Access and an Application to Leader Election
B. Awerbuch, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, Transactions on Algorithms (2014).
LibreCat | Files available | DOI
 
2021 | Bachelorsthesis | LibreCat-ID: 28998
Schutz und Stabilisierung von Overlay-Netzwerken mithilfe des Relay-Layers
D. Suermann, Schutz Und Stabilisierung von Overlay-Netzwerken Mithilfe Des Relay-Layers, 2021.
LibreCat
 
2018 | Conference Paper | LibreCat-ID: 2965
Cloud Architectures for Searchable Encryption
J. Blömer, N. Löken, in: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, ACM, New York, NY, USA, n.d., pp. 25:1--25:10.
LibreCat | Files available | DOI
 
2017 | Conference Paper | LibreCat-ID: 2967 | OA
Subtleties in Security Definitions for Predicate Encryption with Public Index
J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.
LibreCat | Files available | DOI | Download (ext.)
 
2015 | Mastersthesis | LibreCat-ID: 297
Evaluation of Pairing Optimization for Embedded Platforms
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms, Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 299
Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie, Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 301 | OA
Efficient Verifier-Local Revocation for Anonymous Credentials
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 302
Efficient Attributes for Pairing-Based Anonymous Credentials
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität Paderborn, 2015.
LibreCat
 
2015 | Dissertation | LibreCat-ID: 305
Distributed Data Structures and the Power of topological Self-Stabilization
S. Kniesburges, Distributed Data Structures and the Power of Topological Self-Stabilization, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 312
Constructions of Fully Secure Predicate Encryption Schemes
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 273
Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms
K. Kohn, Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms, Universität Paderborn, 2015.
LibreCat
 
2018 | Dissertation | LibreCat-ID: 1138
Distributed Algorithms for Overlay Networks and Programmable Matter
R. Gmyr, Distributed Algorithms for Overlay Networks and Programmable Matter, Universität Paderborn, 2018.
LibreCat | DOI
 
2017 | Dissertation | LibreCat-ID: 116
CCA-Security for Predicate Encryption Schemes
G. Liske, CCA-Security for Predicate Encryption Schemes, Universität Paderborn, 2017.
LibreCat | DOI | Download (ext.)
 
2021 | Bachelorsthesis | LibreCat-ID: 21197
Self-stabilizing Arrow Protocol on Spanning Trees with a Low Diameter
M. Mengshi, Self-Stabilizing Arrow Protocol on Spanning Trees with a Low Diameter, 2021.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 213
Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes
L. Porzenheim, Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes, Universität Paderborn, 2016.
LibreCat
 
2020 | Book Chapter | LibreCat-ID: 21396
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
T. Jager, D. Niehues, in: Lecture Notes in Computer Science, Cham, 2020.
LibreCat | Files available | DOI | Download (ext.)
 
2016 | Bachelorsthesis | LibreCat-ID: 214
Commitment Schemes - Definitions, Variants, and Security
K.S. Bemmann, Commitment Schemes - Definitions, Variants, and Security, Universität Paderborn, 2016.
LibreCat
 
2016 | Conference Paper | LibreCat-ID: 215
Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration
M. Drees, R. Gmyr, C. Scheideler, in: Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2016, pp. 417--427.
LibreCat | Files available | DOI
 
2017 | Conference Paper | LibreCat-ID: 2344 | OA
Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations
J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 208
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
J. Blömer, G. Liske, in: Proceedings of the CT-RSA 2016, 2016, pp. 431–447.
LibreCat | Files available | DOI
 
2014 | Bachelorsthesis | LibreCat-ID: 18001
Ein selbst-stabilisierender Algorithmus für das Finite Sleep Problem in Skip+ Graphen
L. Luo, Ein Selbst-Stabilisierender Algorithmus Für Das Finite Sleep Problem in Skip+ Graphen, Universität Paderborn, 2014.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 18027
An Asynchronous Adaption of a Churn-resistant Overlay Network
N.C. Banh, An Asynchronous Adaption of a Churn-Resistant Overlay Network, Universität Paderborn, 2017.
LibreCat
 
2020 | Dissertation | LibreCat-ID: 18520
Local Graph Transformation Primitives For Some Basic Problems In Overlay Networks
A. Setzer, Local Graph Transformation Primitives For Some Basic Problems In Overlay Networks, Universität Paderborn, 2020.
LibreCat | DOI
 
2020 | Bachelorsthesis | LibreCat-ID: 18637 | OA
A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes
P. Schürmann, A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes, Universität Paderborn, 2020.
LibreCat | Files available
 
2020 | Bachelorsthesis | LibreCat-ID: 18639
Enhancing Security by Usage of Universal One-Way Hash Functions
T. Terfort, Enhancing Security by Usage of Universal One-Way Hash Functions, Universität Paderborn, 2020.
LibreCat
 
2021 | Conference Paper | LibreCat-ID: 22283
Time-Optimal Construction of Overlays
T. Götte, K. Hinnenthal, C. Scheideler, J. Werthmann, in: K. Censor-Hillel (Ed.), Proc. of the 40th ACM Symposium on Principles of Distributed Computing (PODC ’21), ACM, New York, n.d.
LibreCat | Files available | DOI
 
2016 | Mastersthesis | LibreCat-ID: 223
Aggregation in Overlay Networks
K. Hinnenthal, Aggregation in Overlay Networks, Universität Paderborn, 2016.
LibreCat | Files available
 
2015 | Report | LibreCat-ID: 233 | OA
Voronoi Cells of Lattices with Respect to Arbitrary Norms
J. Blömer, K. Kohn, Voronoi Cells of Lattices with Respect to Arbitrary Norms, Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 
2021 | Book Chapter | LibreCat-ID: 22057
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
T. Jager, R. Kurek, D. Niehues, in: Public-Key Cryptography – PKC 2021, Cham, 2021.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22059
Verifiable Random Functions with Optimal Tightness
D. Niehues, in: Public-Key Cryptography – PKC 2021, Cham, 2021.
LibreCat | Files available | DOI
 
2012 | Conference (Editor) | LibreCat-ID: 577
Stabilization, Safety, and Security of Distributed Systems
A.W. Richa, C. Scheideler, eds., Stabilization, Safety, and Security of Distributed Systems, 2012.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 581
Self-Organizing Particle Systems
M. Drees, M. Hüllmann (married name: Eikel), A. Koutsopoulos, C. Scheideler, in: Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2012, pp. 1272–1283.
LibreCat | Files available | DOI
 
2018 | Working Paper | LibreCat-ID: 5820
Provably Anonymous Communication Based on Trusted Execution Environments
J. Blömer, J. Bobolz, C. Scheideler, A. Setzer, Provably Anonymous Communication Based on Trusted Execution Environments, n.d.
LibreCat | Files available
 
2012 | Conference Paper | LibreCat-ID: 585
Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme
R. Petrlic, in: Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS), 2012, pp. 194–211.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 588
Privacy-Preserving DRM for Cloud Computing
R. Petrlic, C. Sorge, in: Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012, pp. 1286–1291.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 589
Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment
R. Petrlic, in: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 958–963.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 5985
Relays: Towards a Link Layer for Robust and Secure Fog Computing
C. Scheideler, in: Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018, 2018, pp. 1–2.
LibreCat | Files available | DOI
 
2017 | Mastersthesis | LibreCat-ID: 60
Semantically Secure Attribute-based Searchable Encryption
D. Niehus, Semantically Secure Attribute-Based Searchable Encryption, Universität Paderborn, 2017.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 606
Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas
N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas, Universität Paderborn, 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 607
Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2
T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2, Universität Paderborn, 2012.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 62
Searchable Encryption
E. Weis, Searchable Encryption, Universität Paderborn, 2017.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 620
Datenschutzgerechtes DRM im Cloud Computing
R. Mittendorf, Datenschutzgerechtes DRM im Cloud Computing, Universität Paderborn, 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 621
Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing
S. Sekula, Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing, Universität Paderborn, 2012.
LibreCat
 
2012 | Conference Paper | LibreCat-ID: 623
Competitive and fair throughput for co-existing networks under adversarial interference
A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, in: Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC), 2012, pp. 291–300.
LibreCat | Files available | DOI
 
2012 | Bachelorsthesis | LibreCat-ID: 629
Attribute-basierte Verschlüsselung
P. Schleiter, Attribute-basierte Verschlüsselung, Universität Paderborn, 2012.
LibreCat
 
2011 | Conference Paper | LibreCat-ID: 645
Stabilizing consensus with the power of two choices
B. Doerr, L.A. Goldberg, L. Minder, T. Sauerwald, C. Scheideler, in: Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2011, pp. 149–158.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 441
Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen
C. Sorge, R. Petrlic, in: Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.
LibreCat | Files available
 
 
2014 | Conference Paper | LibreCat-ID: 446
Competitive MAC under adversarial SINR
A. Ogierman, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, in: Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759.
LibreCat | Files available | DOI
 
2014 | Mastersthesis | LibreCat-ID: 460
Advanced AES-key recovery from decayed RAM-dumps using multi-threading and FPGAs
R. Mittendorf, Advanced AES-Key Recovery from Decayed RAM-Dumps Using Multi-Threading and FPGAs, Universität Paderborn, 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 463
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
LibreCat | Files available | DOI
 
2013 | Bachelorsthesis | LibreCat-ID: 471
Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen
A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013.
LibreCat
 
2013 | Conference Paper | LibreCat-ID: 473
Unlinkable content playbacks in a multiparty DRM system
R. Petrlic, S. Sekula, in: L. Wang, B. Shafiq (Eds.), Data and Applications Security and Privacy XXVII, 2013, pp. 289–296.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 475
Towards practical privacy-preserving Digital Rights Management for Cloud Computing
N. Joshi, R. Petrlic, in: Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–264.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 479
The Legal Classification of Identity-Based Signatures
C. Sorge, Computer Law & Security Review 30 (2014) 126–136.
LibreCat | Files available | DOI
 
2013 | Bachelorsthesis | LibreCat-ID: 486
Seitenkanalresistenz paarungsbasierter Kryptographie
O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie, Universität Paderborn, 2013.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
Security Proofs for Pairing-Based Cryptography in the Generic Group Model
J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model, Universität Paderborn, 2013.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 488
Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study
J. Blömer, P. Günther, V. Krummel, in: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
LibreCat | Files available
 
2017 | Bachelorsthesis | LibreCat-ID: 698
As Asynchronous Adaption of a Churn-resistant Overlay Network
N.C. Banh, As Asynchronous Adaption of a Churn-Resistant Overlay Network, Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 88
Instantiating a Predicate Encryption Scheme via Pair Encodings
A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings, Universität Paderborn, 2017.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 401
Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching
M.C. Platenius, S. Arifulina, R. Petrlic, W. Schäfer, in: Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 410
Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services
A. Jungmann, S. Brangewitz, R. Petrlic, M.C. Platenius, International Journal On Advances in Intelligent Systems (IntSys) 7 (2014) 572--594.
LibreCat | Files available | Download (ext.)
 
2014 | Mastersthesis | LibreCat-ID: 414
Hiding software components using functional encryption
J. Jochheim, Hiding Software Components Using Functional Encryption, Universität Paderborn, 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 416
Group Signature Schemes with Strong Exculpability
P. Bemmann, Group Signature Schemes with Strong Exculpability, Universität Paderborn, 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 421
Fujisaki-Okamoto Transformation
J. Lippert, Fujisaki-Okamoto Transformation, Universität Paderborn, 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 438
Designing an Anonymous and Secure Reputation System Using a Group Signature Variant
A. Kokoschka, Designing an Anonymous and Secure Reputation System Using a Group Signature Variant, Universität Paderborn, 2014.
LibreCat
 
2013 | Conference Paper | LibreCat-ID: 519
IRIS: A Robust Information System Against Insider DoS-Attacks
M. Eikel, C. Scheideler, in: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 119–129.
LibreCat | Files available | DOI
 
2013 | Mastersthesis | LibreCat-ID: 521
Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs
H. Riebler, Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs, Universität Paderborn, 2013.
LibreCat
 
2018 | Conference Paper | LibreCat-ID: 5216
Relays: A New Approach for the Finite Departure Problem in Overlay Networks
C. Scheideler, A. Setzer, in: Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018), 2018.
LibreCat | Files available | DOI
 
2013 | Mastersthesis | LibreCat-ID: 531
Entwurf eines datenschutzgerechten Reputationssystems
S. Lutters, Entwurf eines datenschutzgerechten Reputationssystems, Universität Paderborn, 2013.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 532
Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme
H. Hilleckes, Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme, Universität Paderborn, 2013.
LibreCat
 
 
2013 | Conference Paper | LibreCat-ID: 542
CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system
S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of the 27th International Symposium on Distributed Computing (DISC), 2013, pp. 537–549.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 546
Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network
K. Graffi, M. Benter, M. Divband, S. Kniesburges, A. Koutsopoulos, in: Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 27–34.
LibreCat | Files available | DOI
 
2013 | Bachelorsthesis | LibreCat-ID: 553
Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise
K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.
LibreCat