Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9821 Publications


2012 | Book Chapter | LibreCat-ID: 26102
Bin Tariq F, Korrapati S. Adaptive Web Services for Modular and Reusable Software Development. In: Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems. IGI Global; 2012:263-276.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 26181
Jungmann A, Kleinjohann B. Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition. In: Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION). Xpert Publishing Services; 2012:43-47.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 26190
Jungmann A, Kleinjohann B. Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition. In: Proceedings of the 9th IEEE International Conference on Services Computing (SCC). IEEE; 2012.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 26212
Khaluf Y, Weiss F, Micus S. Master Election for Time Synchronization in Swarm Robotic Systems. In: The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications. ; 2012.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 26264
Mathews E, Mathew C. Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks. In: Third International Conference on Networks & Communications, LNICST. Springer; 2012.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 3812
Wachsmuth H, Stein B. Optimal Scheduling of Information Extraction Algorithms. In: Proceedings of COLING 2012: Posters. ; 2012:1281-1290.
LibreCat | Download (ext.)
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi S, Kiltz E, May A. Certifying RSA. In: Advances in Cryptology – ASIACRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:10.1007/978-3-642-34961-4_25
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. In: Advances in Cryptology – EUROCRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:537-553. doi:10.1007/978-3-642-29011-4_32
LibreCat | DOI | Download (ext.)
 

2012 | Conference Paper | LibreCat-ID: 2982
Ackermann MR, Märtens M, Raupach C, Swierkot K, Lammersen C, Sohler C. StreamKM++: A clustering algorithm for data streams. 2012;17. doi:10.1145/2133803.2184450
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 2984
Blömer J. Turing und Kryptografie. Informatik-Spektrum. 2012;35(4). doi:10.1007/s00287-012-0622-7
LibreCat | DOI
 

2012 | Dissertation | LibreCat-ID: 3132
Jager T. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum; 2012.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 3133
Jager T, Kohlar F, Schäge S, Schwenk J. On the Security of TLS-DHE in the Standard Model. In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. ; 2012:273--293. doi:10.1007/978-3-642-32009-5_17
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3134
Hofheinz D, Jager T. Tightly Secure Signatures and Public-Key Encryption. In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. ; 2012:590--607. doi:10.1007/978-3-642-32009-5_35
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3135
Jager T, Schinzel S, Somorovsky J. Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. ; 2012:752--769. doi:10.1007/978-3-642-33167-1_43
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3136
Hofheinz D, Jager T, Knapp E. Waters Signatures with Optimal Security Reduction. In: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. ; 2012:66--83. doi:10.1007/978-3-642-30057-8_5
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 3180
Travkin O, Wehrheim H, Schellhorn G. Proving Linearizability of Multiset with Local Proof Obligations. {ECEASST}. 2012.
LibreCat
 

2012 | Journal Article | LibreCat-ID: 3181
Ruhroth T, Wehrheim H. Model evolution and refinement. Sci Comput Program. 2012;(3):270--289. doi:10.1016/j.scico.2011.04.007
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3182
Schellhorn G, Wehrheim H, Derrick J. How to Prove Algorithms Linearisable. In: Madhusudan P, A. Seshia S, eds. Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings. Lecture Notes in Computer Science. ; 2012:243--259. doi:10.1007/978-3-642-31424-7_21
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 27176
Engbring D, Selke H. Computer science and society as a field of computer science. Forbrig P, Rick D, Schmolitzky A, eds. 2012;5:111-116.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 27177
Klompmaker F, Workowski Anke , Thronicke W, Ostermair F, Willemsen D, Hoffmann D. User Centered Design of an Interactive Mobile Assistance and Supervision System for Rehabilitation Purposes. In: ; 2012.
LibreCat
 

Filters and Search Terms

department=34

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed