Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
80 Publications
2020 | Journal Article | LibreCat-ID: 20888
Blömer J, Brauer S, Bujna K. A Complexity Theoretical Study of Fuzzy K-Means. ACM Transactions on Algorithms. 2020;16(4):1-25. doi:10.1145/3409385
LibreCat
| DOI
2020 | Journal Article | LibreCat-ID: 10790
Blömer J, Brauer S, Bujna K, Kuntze D. How well do SEM algorithms imitate EM algorithms? A non-asymptotic analysis for mixture models. Advances in Data Analysis and Classification. 2020;14:147–173. doi:10.1007/s11634-019-00366-7
LibreCat
| DOI
2019 | Conference Paper | LibreCat-ID: 13554 |

Blömer J, Löken N. Personal Cross-Platform Reputation. In: Security and Trust Management, STM 2019. Vol 11738. LNCS. ; 2019. doi:10.1007/978-3-030-31511-5_9
LibreCat
| Files available
| DOI
2019 | Conference Paper | LibreCat-ID: 13557 |

Blömer J, Löken N. Dynamic Searchable Encryption with Access Control. In: 12th International Symposium on Foundations and Practice of Security, FPS 2019. Vol 12056. LNCS. Springer; 2019.
LibreCat
| Download (ext.)
2019 | Conference Paper | LibreCat-ID: 13904 |

Blömer J, Bobolz J, Diemert DP, Eidens F. Updatable Anonymous Credentials and Applications to Incentive Systems. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. ; 2019. doi:10.1145/3319535.3354223
LibreCat
| Files available
| DOI
| Download (ext.)
2018 | Conference Paper | LibreCat-ID: 2862 |

Blömer J, Eidens F, Juhnke J. Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings. Cham: Springer International Publishing; 2018:470-490. doi:10.1007/978-3-319-76953-0_25
LibreCat
| Files available
| DOI
| Download (ext.)
2018 | Journal Article | LibreCat-ID: 2685
Blömer J, Kohn K. Voronoi Cells of Lattices with Respect to Arbitrary Norms. SIAM Journal on Applied Algebra and Geometry. 2018;2(2):314-338. doi:10.1137/17M1132045
LibreCat
| Files available
| DOI
2018 | Conference Paper | LibreCat-ID: 3265 |

Bemmann K, Blömer J, Bobolz J, et al. Fully-Featured Anonymous Credentials with Reputation System. In: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. doi:10.1145/3230833.3234517
LibreCat
| Files available
| DOI
| Download (ext.)
2018 | Conference Paper | LibreCat-ID: 2965
Blömer J, Löken N. Cloud Architectures for Searchable Encryption. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018. New York, NY, USA: ACM; :25:1--25:10. doi:10.1145/3230833.3230853
LibreCat
| Files available
| DOI
2018 | Working Paper | LibreCat-ID: 5820
Blömer J, Bobolz J, Scheideler C, Setzer A. Provably Anonymous Communication Based on Trusted Execution Environments.
LibreCat
| Files available
2018 | Conference Paper | LibreCat-ID: 4344
Blömer J, Brauer S, Bujna K. Coresets for Fuzzy K-Means with Applications. In: 29th International Symposium on Algorithms and Computation (ISAAC 2018). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik; 2018:46:1--46:12. doi:10.4230/LIPIcs.ISAAC.2018.46
LibreCat
| DOI
2018 | Conference Paper | LibreCat-ID: 3873 |

Blömer J, Eidens F, Juhnke J. Enhanced Security of Attribute-Based Signatures. In: The International Conference on Cryptology And Network Security (CANS). Vol 11124. Lecture Notes in Computer Science. Springer; 2018:235-255. doi:10.1007/978-3-030-00434-7_12
LibreCat
| Files available
| DOI
| Download (ext.)
2018 | Conference Paper | LibreCat-ID: 2379 |

Blömer J, Bobolz J. Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. In: ACNS 2018 Applied Cryptography & Network Security. LNCS. doi:10.1007/978-3-319-93387-0_12
LibreCat
| Files available
| DOI
| Download (ext.)
2017 | Conference Paper | LibreCat-ID: 2967 |

Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS). Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:10.1007/978-3-319-72453-9_35
LibreCat
| Files available
| DOI
| Download (ext.)
2017 | Conference Paper | LibreCat-ID: 2344 |

Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: Foundations and Practice of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1
LibreCat
| Files available
| DOI
2016 | Conference Paper | LibreCat-ID: 2947
Blömer J, Günther P. Singular Curve Point Decompression Attack. In: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE; 2016. doi:10.1109/fdtc.2015.17
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 2968
Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: Algorithm Engineering. Cham: Springer International Publishing; 2016:81-116. doi:10.1007/978-3-319-49487-6_3
LibreCat
| DOI
2016 | Preprint | LibreCat-ID: 2969 |

Blömer J, Brauer S, Bujna K. Hard-Clustering with Gaussian Mixture Models. 2016.
LibreCat
| Download (ext.)
2016 | Book Chapter | LibreCat-ID: 2970
Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances in Knowledge Discovery and Data Mining. Cham: Springer International Publishing; 2016:296-308. doi:10.1007/978-3-319-31750-2_24
LibreCat
| DOI
2016 | Report | LibreCat-ID: 2971
Blömer J, Günther P. Effizienz Und Sicherheit Paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops; 2016.
LibreCat