Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
483 Publications
2014 | Conference Paper | LibreCat-ID: 374
Relocatable Hardware Threads in Run-Time Reconfigurable Systems
A. Wold, A. Agne, J. Torresen, in: D. Goehringer, M. Santambrogio, J.P. Cardoso, K. Bertels (Eds.), Proceedings of the 10th International Symposium on Reconfigurable Computing: Architectures, Tools, and Applications, 2014, pp. 61–72.
LibreCat
| Files available
| DOI
A. Wold, A. Agne, J. Torresen, in: D. Goehringer, M. Santambrogio, J.P. Cardoso, K. Bertels (Eds.), Proceedings of the 10th International Symposium on Reconfigurable Computing: Architectures, Tools, and Applications, 2014, pp. 61–72.
2014 | Journal Article | LibreCat-ID: 378
Re-Chord: A Self-stabilizing Chord Overlay Network
S. Kniesburges, A. Koutsopoulos, C. Scheideler, Theory of Computing Systems (2014) 591–612.
LibreCat
| Files available
| DOI
S. Kniesburges, A. Koutsopoulos, C. Scheideler, Theory of Computing Systems (2014) 591–612.
2014 | Conference Paper | LibreCat-ID: 384
Privacy-Preserving Reputation Management
R. Petrlic, S. Lutters, C. Sorge, in: Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–1718.
LibreCat
| Files available
| DOI
R. Petrlic, S. Lutters, C. Sorge, in: Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–1718.
2014 | Dissertation | LibreCat-ID: 385
Privacy-Preserving Multiparty Digital Rights Management
R. Petrlic, Privacy-Preserving Multiparty Digital Rights Management, Universität Paderborn, 2014.
LibreCat
| Files available
R. Petrlic, Privacy-Preserving Multiparty Digital Rights Management, Universität Paderborn, 2014.
2014 | Conference Paper | LibreCat-ID: 386
Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
R. Petrlic, C. Sorge, in: Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5.
LibreCat
| Files available
| DOI
R. Petrlic, C. Sorge, in: Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5.
2014 | Journal Article | LibreCat-ID: 387
Principles of Robust Medium Access and an Application to Leader Election
B. Awerbuch, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, Transactions on Algorithms (2014).
LibreCat
| Files available
| DOI
B. Awerbuch, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, Transactions on Algorithms (2014).
2014 | Report | LibreCat-ID: 389
Ontology-based Representation of Optimization Models
F. Stapel, L. Suhl, Ontology-Based Representation of Optimization Models, Universität Paderborn, 2014.
LibreCat
| Files available
F. Stapel, L. Suhl, Ontology-Based Representation of Optimization Models, Universität Paderborn, 2014.
2014 | Bachelorsthesis | LibreCat-ID: 18001
Ein selbst-stabilisierender Algorithmus für das Finite Sleep Problem in Skip+ Graphen
L. Luo, Ein Selbst-Stabilisierender Algorithmus Für Das Finite Sleep Problem in Skip+ Graphen, Universität Paderborn, 2014.
LibreCat
L. Luo, Ein Selbst-Stabilisierender Algorithmus Für Das Finite Sleep Problem in Skip+ Graphen, Universität Paderborn, 2014.
2014 | Conference Paper | LibreCat-ID: 441
Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen
C. Sorge, R. Petrlic, in: Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.
LibreCat
| Files available
C. Sorge, R. Petrlic, in: Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.
2014 | Preprint | LibreCat-ID: 442 |

Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
J. Blömer, G. Liske, (2014).
LibreCat
| Files available
| Download (ext.)
J. Blömer, G. Liske, (2014).
2014 | Conference Paper | LibreCat-ID: 446
Competitive MAC under adversarial SINR
A. Ogierman, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, in: Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759.
LibreCat
| Files available
| DOI
A. Ogierman, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, in: Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759.
2014 | Conference Paper | LibreCat-ID: 451
Budget-restricted utility games with ordered strategic decisions
M. Drees, S. Riechers, A. Skopalik, in: R. Lavi (Ed.), Proceedings of the 7th International Symposium on Algorithmic Game Theory (SAGT), 2014, pp. 110–121.
LibreCat
| Files available
| DOI
M. Drees, S. Riechers, A. Skopalik, in: R. Lavi (Ed.), Proceedings of the 7th International Symposium on Algorithmic Game Theory (SAGT), 2014, pp. 110–121.
2014 | Mastersthesis | LibreCat-ID: 460
Advanced AES-key recovery from decayed RAM-dumps using multi-threading and FPGAs
R. Mittendorf, Advanced AES-Key Recovery from Decayed RAM-Dumps Using Multi-Threading and FPGAs, Universität Paderborn, 2014.
LibreCat
R. Mittendorf, Advanced AES-Key Recovery from Decayed RAM-Dumps Using Multi-Threading and FPGAs, Universität Paderborn, 2014.
2014 | Conference Paper | LibreCat-ID: 463
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
LibreCat
| Files available
| DOI
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
2014 | Report | LibreCat-ID: 465
A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks
F. Stapel, L. Suhl, A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks, Universität Paderborn, 2014.
LibreCat
| Files available
F. Stapel, L. Suhl, A MINLP Approach for Planning the Renewal of Pipes in Drinking Water Networks, Universität Paderborn, 2014.
2014 | Mastersthesis | LibreCat-ID: 466
A generalized loop accelerator implemented as a coarse grained array
M. Brand, A Generalized Loop Accelerator Implemented as a Coarse Grained Array, Universität Paderborn, 2014.
LibreCat
M. Brand, A Generalized Loop Accelerator Implemented as a Coarse Grained Array, Universität Paderborn, 2014.
2014 | Journal Article | LibreCat-ID: 479
The Legal Classification of Identity-Based Signatures
C. Sorge, Computer Law & Security Review 30 (2014) 126–136.
LibreCat
| Files available
| DOI
C. Sorge, Computer Law & Security Review 30 (2014) 126–136.
2014 | Conference Paper | LibreCat-ID: 401
Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching
M.C. Platenius, S. Arifulina, R. Petrlic, W. Schäfer, in: Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17.
LibreCat
| Files available
| DOI
M.C. Platenius, S. Arifulina, R. Petrlic, W. Schäfer, in: Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17.
2014 | Journal Article | LibreCat-ID: 410
Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services
A. Jungmann, S. Brangewitz, R. Petrlic, M.C. Platenius, International Journal On Advances in Intelligent Systems (IntSys) 7 (2014) 572--594.
LibreCat
| Files available
| Download (ext.)
A. Jungmann, S. Brangewitz, R. Petrlic, M.C. Platenius, International Journal On Advances in Intelligent Systems (IntSys) 7 (2014) 572--594.
2014 | Mastersthesis | LibreCat-ID: 414
Hiding software components using functional encryption
J. Jochheim, Hiding Software Components Using Functional Encryption, Universität Paderborn, 2014.
LibreCat
J. Jochheim, Hiding Software Components Using Functional Encryption, Universität Paderborn, 2014.