Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

15986 Publications

2015 | Journal Article | LibreCat-ID: 284
IRIS: A Robust Information System Against Insider DoS Attacks
M. Eikel, C. Scheideler, Transactions on Parallel Computing (2015) 18:1--18:33.
LibreCat | Files available | DOI

2015 | Conference Paper | LibreCat-ID: 289
How do Different Sources of the Variance of Consumer Ratings Matter?
P. Herrmann, D. Kundisch, S. Zimmermann, B. Nault, in: Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, 2015.
LibreCat | Files available

2015 | Bachelorsthesis | LibreCat-ID: 291
Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen
P. Börding, Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen, Universität Paderborn, 2015.

2015 | Book Chapter | LibreCat-ID: 2921
Tightly-Secure Signatures from Chameleon Hash Functions
O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.
LibreCat | DOI | Download (ext.)

2015 | Journal Article | LibreCat-ID: 2957
Short-and medium-term effects of informal care provision on female caregivers’ health
H. Schmitz, M. Westphal, Journal of Health Economics (2015) 174--185.

2015 | Journal Article | LibreCat-ID: 296
Exploring Tradeoffs between Specialized Kernels and a Reusable Overlay in a Stereo-Matching Case Study
T. Kenter, H. Schmitz, C. Plessl, International Journal of Reconfigurable Computing (IJRC) 2015 (2015).
LibreCat | Files available | DOI

2015 | Conference Paper | LibreCat-ID: 3121
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.
LibreCat | DOI

2015 | Conference Paper | LibreCat-ID: 3126
Tightly-Secure Authenticated Key Exchange
C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.
LibreCat | DOI

2015 | Bachelorsthesis | LibreCat-ID: 316
Budget Games with priced strategies
J. Pautz, Budget Games with Priced Strategies, Universität Paderborn, 2015.

2015 | Conference Paper | LibreCat-ID: 3164
Verifying Opacity of a Transactional Mutex Lock
J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\o}rner, F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.
LibreCat | DOI

Filters and Search Terms



Filter Publications

Display / Sort

Citation Style: Default

Export / Embed