Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

10826 Publications


2015 | Book | LibreCat-ID: 3879
Wachsmuth, Henning. Text Analysis Pipelines - Towards Ad-Hoc Large-Scale Text Mining. 2015, doi:http://dx.doi.org/10.1007/978-3-319-25741-9.
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 3892 | OA
Losquin, Arthur, et al. “Unveiling Nanometer Scale Extinction and Scattering Phenomena through Combined Electron Energy Loss Spectroscopy and Cathodoluminescence Measurements.” Nano Letters, vol. 15, no. 2, American Chemical Society (ACS), 2015, pp. 1229–37, doi:10.1021/nl5043775.
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 3894 | OA
Hammer, Manfred, et al. “How Planar Optical Waves Can Be Made to Climb Dielectric Steps.” Optics Letters, vol. 40, no. 16, The Optical Society, 2015, pp. 3711–14, doi:10.1364/ol.40.003711.
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 3896 | OA
Kou, Yao, and Jens Förstner. “Subwavelength Binary Plasmonic Solitons.” Optics Letters, vol. 40, no. 6, The Optical Society, 2015, pp. 851–54, doi:10.1364/ol.40.000851.
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 3900 | OA
Mantei, D., et al. “Robust Population Inversion by Polarization Selective Pulsed Excitation.” Scientific Reports, vol. 5, no. 1, Springer Nature, 2015, p. 10313, doi:10.1038/srep10313.
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 290
Besova, Galina, et al. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” Computer Languages, Systems & Structures, Elsevier, 2015, pp. 116–38, doi:10.1016/j.cl.2015.05.003.
LibreCat | Files available | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.” Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2015, pp. 256–79, doi:10.1007/978-3-662-46447-2_12.
LibreCat | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak, Martin. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken, Britta. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz, Jan. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh, Christian. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn, 2015.
LibreCat
 

2015 | Dissertation | LibreCat-ID: 304
Koutsopoulos, Andreas. Dynamics and Efficiency in Topological Self-Stabilization. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Dissertation | LibreCat-ID: 305
Kniesburges, Sebastian. Distributed Data Structures and the Power of Topological Self-Stabilization. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter, Patrick. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl, Florian, et al. “Confined Guessing: New Signatures From Standard Assumptions.” J. Cryptology, no. 1, 2015, pp. 176--208, doi:10.1007/s00145-014-9183-z.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196, doi:10.1145/2810103.2813657.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425, doi:10.1007/978-3-319-24174-6_21.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer, Felix, et al. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51, doi:10.1007/978-3-662-46447-2_2.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, Florian, et al. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494, doi:10.1007/978-3-662-46447-2_21.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143, doi:10.1007/978-3-662-46497-7_5.
LibreCat | DOI
 

Filters and Search Terms

department=34

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export / Embed