Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9810 Publications


2016 | Journal Article | LibreCat-ID: 3841 | OA
Phase sensitive properties and coherent manipulation of a photonic crystal microcavity
W. Quiring, B. Jonas, J. Förstner, A.K. Rai, D. Reuter, A.D. Wieck, A. Zrenner, Optics Express 24 (2016) 20672–20684.
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 3843
Light scattering by irregular particles much larger than the wavelength with wavelength-scale surface roughness
Y. Grynko, Y. Shkuratov, J. Förstner, Optics Letters 41 (2016) 3491–3493.
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 3849
Light scattering by ice crystals of cirrus clouds: comparison of the physical optics methods
A.V. Konoshonkin, N.V. Kustova, A.G. Borovoi, Y. Grynko, J. Förstner, Journal of Quantitative Spectroscopy and Radiative Transfer 182 (2016) 12–23.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 3880
Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse
H. Wachsmuth, in: Ausgezeichnete Informatikdissertationen 2015, 2016, pp. 329–338.
LibreCat | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 3884 | OA
Discrete plasmonic solitons in graphene-coated nanowire arrays
Y. Kou, J. Förstner, Optics Express 24 (2016) 4714.
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 3886
The role of electromagnetic interactions in second harmonic generation from plasmonic metamaterials
J. Alberti, H. Linnenbank, S. Linden, Y. Grynko, J. Förstner, Applied Physics B 122 (2016) 45–50.
LibreCat | Files available | DOI
 

2016 | Mastersthesis | LibreCat-ID: 2898
Searchable Encryption
E. Weis, Searchable Encryption, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2947
Singular Curve Point Decompression Attack
J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), IEEE, 2016.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures
P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Theoretical Analysis of the k-Means Algorithm – A Survey
J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.
LibreCat | DOI
 

2016 | Preprint | LibreCat-ID: 2969 | OA
Hard-Clustering with Gaussian Mixture Models
J. Blömer, S. Brauer, K. Bujna, (2016).
LibreCat | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2970
Adaptive Seeding for Gaussian Mixture Models
J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.
LibreCat | DOI
 

2016 | Report | LibreCat-ID: 2971
Effizienz und Sicherheit paarungsbasierter Kryptographie
J. Blömer, P. Günther, Effizienz Und Sicherheit Paarungsbasierter Kryptographie, Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
 

2016 | Journal Article | LibreCat-ID: 3112
Tightly secure signatures and public-key encryption
D. Hofheinz, T. Jager, Des. Codes Cryptography (2016) 29--61.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3113
Selective opening security of practical public-key encryption schemes
F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016) 304--318.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3114 LibreCat
 

2016 | Conference Paper | LibreCat-ID: 3115
How to Generate and Use Universal Samplers
D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3116
Breaking PPTP VPNs via RADIUS Encryption
M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3117
On the Impossibility of Tight Cryptographic Reductions
C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Verifiable Random Functions from Standard Assumptions
D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3157
Verification of AUTOSAR Software Architectures with Timed Automata
S. Beringer, H. Wehrheim, in: M. H. ter Beek, S. Gnesi, A. Knapp (Eds.), Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings, 2016, pp. 189--204.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 3158
Verification of Concurrent Programs on Weak Memory Models
O. Travkin, H. Wehrheim, in: A. Sampaio, F. Wang (Eds.), Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings, 2016, pp. 3--24.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3159
Towards a Thread-Local Proof Technique for Starvation Freedom
G. Schellhorn, O. Travkin, H. Wehrheim, in: M. Huisman (Ed.), Integrated Formal Methods - 12th International Conference, {IFM} 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings, 2016, pp. 193--209.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3160
Proving Opacity of a Pessimistic {STM}
S. Doherty, B. Dongol, J. Derrick, G. Schellhorn, H. Wehrheim, in: P. Fatourou, E. Jim{\’{e}}nez, F. Pedone (Eds.), 20th International Conference on Principles of Distributed Systems, {OPODIS} 2016, December 13-16, 2016, Madrid, Spain, 2016, pp. 35:1--35:17.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3161
Deriving approximation tolerance constraints from verification runs
T. Isenberg, M.-}Christine Jakobs, F. Pauck, H. Wehrheim, CoRR (2016).
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 210
Congestion Games with Mixed Objectives
L. Leder, Congestion Games with Mixed Objectives, Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes
L. Porzenheim, Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes, Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Commitment Schemes - Definitions, Variants, and Security
K.S. Bemmann, Commitment Schemes - Definitions, Variants, and Security, Universität Paderborn, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 215
Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration
M. Drees, R. Gmyr, C. Scheideler, in: Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2016, pp. 417--427.
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 175
On-The-Fly Construction of Provably Correct Service Compositions - Templates and Proofs
S. Walther, H. Wehrheim, Science of Computer Programming (2016) 2--23.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 17655
The Game of Reciprocation Habits
G. Polevoy, M.M. de Weerdt, C.M. Jonker, in: Proceedings of the 2016 European Conference on Artificial Intelligence, 2016, pp. 417–425.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 17656
The Convergence of Reciprocation
G. Polevoy, M. de Weerdt, C. Jonker, in: Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems, International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 2016, pp. 1431–1432.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 177
On the Parameterized Parallel Complexity and the Vertex Cover Problem
F.N. Abu-Khzam, S. Li, C. Markarian, F. Meyer auf der Heide, P. Podlipyan, in: Proceedings of the 10th International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 477–488.
LibreCat | Files available | DOI
 

2016 | Special Issue | LibreCat-ID: 187
Introduction to the Special Issue on SPAA 2014
F. Meyer auf der Heide, ed., Introduction to the Special Issue on SPAA 2014, 2016.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 19
Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension
M. Lass, D. Leibenger, C. Sorge, in: Proc. 41st Conference on Local Computer Networks (LCN), IEEE, 2016.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 190
Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic
M.C. Platenius, A. Shaker, M. Becker, E. Hüllermeier, W. Schäfer, IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017 (2016) 739–759.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 2367
A Theoretical Analysis of the Fuzzy K-Means Problem
J. Blömer, S. Brauer, K. Bujna, in: 2016 IEEE 16th International Conference on Data Mining (ICDM), IEEE, 2016, pp. 805–810.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20556
Information Flow Analysis for Go
E. Bodden, K. I Pun, M. Steffen, V. Stolz, A.-K. Wickert, in: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 2016, pp. 431–445.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 207
Cost-efficient Scheduling on Machines from the Cloud
A. Mäcker, M. Malatyali, F. Meyer auf der Heide, S. Riechers, in: Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 578--592.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 20716
Don't let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go
E. Bodden, M. Eichberg, K. I Pun, M. Steffen, V. Stolz, A.-K. Wickert, in: Nordic Workshop on Programming Theory (NWPT’16), 2016.
LibreCat | Download (ext.)
 

2016 | Report | LibreCat-ID: 20717
Just-in-Time Static Analysis
L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, Just-in-Time Static Analysis, 2016.
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20718
Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen
S. Rasthofer, S. Arzt, E. Bodden, M. Miltenberger, Datenschutz Und Datensicherheit (2016) 718–722.
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20719
An In-Depth Study of More Than Ten Years of Java Exploitation
P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20720
PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution
A. Follner, A. Bartel, H. Peng, Y.-C. Chang, K. Ispoglou, M. Payer, E. Bodden, in: International Workshop on Security and Trust Management (STM), 2016, pp. 212–228.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20721
Toward an Automated Benchmark Management System
L. Nguyen Quang Do, M. Eichberg, E. Bodden, in: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 13–17.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20722
Towards Cross-Platform Cross-Language Analysis with Soot
S. Arzt, T. Kussmaul, E. Bodden, in: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 1–6.
LibreCat | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20724
ROPocop — Dynamic mitigation of code-reuse attacks
A. Follner, E. Bodden, Journal of Information Security and Applications 29 (2016) 16–26.
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20725
Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality
A. Follner, A. Bartel, E. Bodden, in: International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20726
Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels
K. Falzon, E. Bodden, in: F. Piessens, L. Vigan’o (Eds.), Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg, 2016, pp. 116–138.
LibreCat | DOI | Download (ext.)
 

Filters and Search Terms

department=34

Search

Filter Publications

Display / Sort

Export / Embed