Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

229 Publications


2019 | Mastersthesis | LibreCat-ID: 13128 | OA
H. Bröcher, Rational Secure Multiparty Computation. Universität Paderborn, 2019.
LibreCat | Files available
 

2019 | Mastersthesis | LibreCat-ID: 10306 | OA
L. A. Porzenheim, Post-Quantum Secure Group Signatures. 2019.
LibreCat | Files available
 

2019 | Conference Paper | LibreCat-ID: 13554 | OA
J. Blömer and N. Löken, “Personal Cross-Platform Reputation,” in Security and Trust Management, STM 2019, 2019, vol. 11738.
LibreCat | Files available | DOI
 

2019 | Conference Paper | LibreCat-ID: 13557 | OA
J. Blömer and N. Löken, “Dynamic Searchable Encryption with Access Control,” in 12th International Symposium on Foundations and Practice of Security, FPS 2019, 2019, vol. 12056.
LibreCat | Download (ext.)
 

2019 | Bachelorsthesis | LibreCat-ID: 13592
M. Pilot, Efficient Finite-Field Arithmetic for Elliptic Curve Cryptography in Java. Universität Paderborn, 2019.
LibreCat
 

2019 | Mastersthesis | LibreCat-ID: 13648 | OA
S. Scholz, Implementation and Comparison of Elliptic Curve Algorithms in Java. Universität Paderborn, 2019.
LibreCat | Files available
 

2019 | Dissertation | LibreCat-ID: 13679
S. Brauer, Classification and Approximation of Geometric Location Problems. Paderborn, 2019.
LibreCat | DOI
 

2019 | Conference Paper | LibreCat-ID: 13904 | OA
J. Blömer, J. Bobolz, D. P. Diemert, and F. Eidens, “Updatable Anonymous Credentials and Applications to Incentive Systems,” presented at the 26th ACM Conference on Computer and Communications Security, London, 2019, doi: 10.1145/3319535.3354223.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2862 | OA
J. Blömer, F. Eidens, and J. Juhnke, “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems,” in Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, San Francisco, CA, USA, 2018, pp. 470–490.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Journal Article | LibreCat-ID: 2685
J. Blömer and K. Kohn, “Voronoi Cells of Lattices with Respect to Arbitrary Norms,” SIAM Journal on Applied Algebra and Geometry., vol. 2, no. 2, pp. 314–338, 2018.
LibreCat | Files available | DOI
 

2018 | Conference Paper | LibreCat-ID: 3265 | OA
K. Bemmann et al., “Fully-Featured Anonymous Credentials with Reputation System,” in Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, Hamburg, Germany.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2965
J. Blömer and N. Löken, “Cloud Architectures for Searchable Encryption,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, pp. 25:1--25:10.
LibreCat | Files available | DOI
 

2018 | Working Paper | LibreCat-ID: 5820
J. Blömer, J. Bobolz, C. Scheideler, and A. Setzer, Provably Anonymous Communication Based on Trusted Execution Environments. .
LibreCat | Files available
 

2018 | Conference Paper | LibreCat-ID: 4344
J. Blömer, S. Brauer, and K. Bujna, “Coresets for Fuzzy K-Means with Applications,” in 29th International Symposium on Algorithms and Computation  (ISAAC 2018), Jiaoxi, Yilan County, Taiwan, 2018, pp. 46:1--46:12.
LibreCat | DOI
 

2018 | Bachelorsthesis | LibreCat-ID: 5426
O. von Heißen, Implementierung und Analyse von Searchable Encryption. 2018.
LibreCat
 

2018 | Dissertation | LibreCat-ID: 6597
J. Juhnke, Models and Constructions for Secure Reputation Systems. Universität Paderborn, 2018.
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 3873 | OA
J. Blömer, F. Eidens, and J. Juhnke, “Enhanced Security of Attribute-Based Signatures,” in The International Conference on Cryptology And Network Security (CANS), Naples, Italy, 2018, vol. 11124, pp. 235–255, doi: 10.1007/978-3-030-00434-7_12.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2379 | OA
J. Blömer and J. Bobolz, “Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures,” presented at the The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, doi: 10.1007/978-3-319-93387-0_12.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 2908
K. Bujna, Soft Clustering Algorithms - Theoretical and Practical Improvements. Universität Paderborn, 2017.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 2017, vol. 10693, pp. 438–453.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 116
G. Liske, CCA-Security for Predicate Encryption Schemes. Universität Paderborn, 2017.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
N. Löken, “Searchable Encryption with Access Control,” in Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17, 2017.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2344 | OA
J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in Foundations and Practice of Security, 2017, pp. 3–17.
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems,” in Lecture Notes in Computer Science, vol. 10236, D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International Publishing, 2017, pp. 116–127.
LibreCat | DOI
 

2017 | Mastersthesis | LibreCat-ID: 60
D. Niehus, Semantically Secure Attribute-based Searchable Encryption. Universität Paderborn, 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 88
A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings. Universität Paderborn, 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 67
M. Jürgens, Provably Secure Key-Derivation-Functions for Certain Types of Applications. Universität Paderborn, 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 104
D. Diemert, EAX - An Authenticated Encryption Mode for Block Ciphers. Universität Paderborn, 2017.
LibreCat
 

2017 | Mastersthesis | LibreCat-ID: 117
P. Bemmann, Attribute-based Signatures using Structure Preserving Signatures. Universität Paderborn, 2017.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 2898
E. Weis, Searchable Encryption. 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2947
J. Blömer and P. Günther, “Singular Curve Point Decompression Attack,” in 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in Mathematical Aspects of Computer and Information Sciences, Cham: Springer International Publishing, 2016, pp. 151–165.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in Algorithm Engineering, Cham: Springer International Publishing, 2016, pp. 81–116.
LibreCat | DOI
 

2016 | Preprint | LibreCat-ID: 2969 | OA
J. Blömer, S. Brauer, and K. Bujna, “Hard-Clustering with Gaussian Mixture Models.” Computing Research Repository, 2016.
LibreCat | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2970
J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in Advances in Knowledge Discovery and Data Mining, Cham: Springer International Publishing, 2016, pp. 296–308.
LibreCat | DOI
 

2016 | Report | LibreCat-ID: 2971
J. Blömer and P. Günther, Effizienz und Sicherheit paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
L. Porzenheim, Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
K. S. Bemmann, Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2367
J. Blömer, S. Brauer, and K. Bujna, “A Theoretical Analysis of the Fuzzy K-Means Problem,” in 2016 IEEE 16th International Conference on Data Mining (ICDM), Barcelona, Spain, 2016, pp. 805–810.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 208
J. Blömer and G. Liske, “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes,” in Proceedings of the CT-RSA 2016, 2016, pp. 431–447.
LibreCat | Files available | DOI
 

2016 | Dissertation | LibreCat-ID: 167
P. Günther, Physical attacks on pairing-based cryptography. Universität Paderborn, 2016.
LibreCat | Files available | Download (ext.)
 

2016 | Mastersthesis | LibreCat-ID: 146
J. Hamm, Symmetric Anonymous Credentials with Protocols for Relations on Attributes. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 152
F. Dallmeier, Short Randomizable Aggregatable Signatures: Constructions and Security Analysis. Universität Paderborn, 2016.
LibreCat
 

2016 | Book Chapter | LibreCat-ID: 2978
J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in Advances in Knowledge Discovery and Data Mining, Cham: Springer International Publishing, 2016, pp. 296–308.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 253
J. Blömer, J. Juhnke, and N. Löken, “Short Group Signatures with Distributed Traceability,” in Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 286
B. Kalde, Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup. Universität Paderborn, 2015.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 2865
D. Strotmann, Singulärwertzerlegung für μ-ähnliche Bregman-Divergenzen. 2015.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 261
T. Eisenhofer, Protokolle zur authentifizierten Schüsselvereinbarung. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 321
F. Eidens, Anonymous credential system based on q-Strong Diffie-Hellman Assumption. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 322 | OA
J. Blömer, J. Juhnke, and C. Kolb, “Anonymous and Publicly Linkable Reputation Systems,” in Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 325
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 326
F. Heihoff, A group signature scheme based on the LSRW assumption. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 297
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 312
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 273
K. Kohn, Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms. Universität Paderborn, 2015.
LibreCat
 

2015 | Report | LibreCat-ID: 233 | OA
J. Blömer and K. Kohn, Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 

2014 | Bachelorsthesis | LibreCat-ID: 2866
F. Biermeier, Untersuchung des Erreichbarkeitsproblems in ungerichteten Graphen bezüglich den Komplexitätsklassen L und SL. 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 2867
M. Sauer, Evaluierung von Initialisierungsmethoden für Fuzzy-k-means Algorithmen. 2014.
LibreCat
 

2014 | Conference Paper | LibreCat-ID: 355
J. Blömer, P. Günther, and G. Liske, “Tampering attacks in pairing-based cryptography,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.
LibreCat | Files available | DOI
 

2014 | Bachelorsthesis | LibreCat-ID: 369
T. Rath, RSA-Full Domain Hash Revisited. Universität Paderborn, 2014.
LibreCat
 

2014 | Mastersthesis | LibreCat-ID: 2900
S. Brauer, A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures. 2014.
LibreCat | Files available
 

2014 | Journal Article | LibreCat-ID: 2976
M. R. Ackermann, J. Blömer, D. Kuntze, and C. Sohler, “Analysis of Agglomerative Clustering,” Algorithmica, vol. 69, 2014.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 2977
J. Blömer, K. Bujna, and D. Kuntze, “A Theoretical and Experimental Comparison of the EM and SEM Algorithm,” in 2014 22nd International Conference on Pattern Recognition, 2014.
LibreCat | DOI
 

2014 | Preprint | LibreCat-ID: 442 | OA
J. Blömer and G. Liske, “Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions.” Universität Paderborn, 2014.
LibreCat | Files available | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 463
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, and J.-P. Seifert, “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
LibreCat | Files available | DOI
 

2014 | Mastersthesis | LibreCat-ID: 414
J. Jochheim, Hiding software components using functional encryption. Universität Paderborn, 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 416
P. Bemmann, Group Signature Schemes with Strong Exculpability. Universität Paderborn, 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 421
J. Lippert, Fujisaki-Okamoto Transformation. Universität Paderborn, 2014.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2868
S. Laudemann, Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten. 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2869
L. Leder, Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken. 2013.
LibreCat
 

2013 | Dissertation | LibreCat-ID: 2909
D. Kuntze, Practical algorithms for clustering and modeling large data sets - Analysis and improvements. Universität Paderborn, 2013.
LibreCat | Download (ext.)
 

2013 | Report | LibreCat-ID: 2917
J. Juhnke, H. Lefmann, and V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI, 2013.
LibreCat
 

2013 | Book Chapter | LibreCat-ID: 2979
J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing Based Cryptography,” in Constructive Side-Channel Analysis and Secure Design, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.
LibreCat | DOI
 

2013 | Bachelorsthesis | LibreCat-ID: 471
A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 486
O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn, 2013.
LibreCat | Files available
 

2013 | Conference Paper | LibreCat-ID: 488
J. Blömer, P. Günther, and V. Krummel, “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study,” in Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
LibreCat | Files available
 

2013 | Preprint | LibreCat-ID: 538 | OA
J. Blömer and G. Liske, “Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn, 2013.
LibreCat | Files available | Download (ext.)
 

2013 | Bachelorsthesis | LibreCat-ID: 553
K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn, 2013.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 2982
M. R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, and C. Sohler, “StreamKM++: A clustering algorithm for data streams,” vol. 17. ACM, New York, NY, USA, 2012.
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 2984
J. Blömer, “Turing und Kryptografie,” Informatik-Spektrum, vol. 35, no. 4, 2012.
LibreCat | DOI
 

2012 | Bachelorsthesis | LibreCat-ID: 606
N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn, 2012.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 607
T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn, 2012.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 629
P. Schleiter, Attribute-basierte Verschlüsselung. Universität Paderborn, 2012.
LibreCat
 

2011 | Bachelorsthesis | LibreCat-ID: 2872
T. Böttger, Bicriteria-Approximation für das k-Median-Clustering mit Bregman-Divergenzen. 2011.
LibreCat | Files available
 

2011 | Mastersthesis | LibreCat-ID: 2902
M. Märtens, The Monotone Complexity of Computing k-Clique on Random Graphs. 2011.
LibreCat
 

2011 | Dissertation | LibreCat-ID: 2910
S. Naewe, Algorithms for lattice problems with respect to general norms. Universität Paderborn, 2011.
LibreCat | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 2985
M. R. Ackermann, J. Blömer, and C. Scholz, “Hardness and Non-Approximability of Bregman Clustering Problems.” 2011.
LibreCat
 

2011 | Book Chapter | LibreCat-ID: 2986
J. Blömer, “How to Share a Secret,” in Algorithms Unplugged, Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 159–168.
LibreCat | DOI
 

2011 | Preprint | LibreCat-ID: 2987
J. Blömer and S. Naewe, “Solving the Closest Vector Problem with respect to Lp Norms,” arXiv:1104.3720. 2011.
LibreCat
 

2011 | Mastersthesis | LibreCat-ID: 659
G. Liske, Fault attacks in pairing-based cryptography. Universität Paderborn, 2011.
LibreCat | Files available
 

2010 | Book Chapter | LibreCat-ID: 2988
M. R. Ackermann and J. Blömer, “Bregman Clustering for Separable Instances,” in SWAT 2010, Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 212–223.
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2990
M. R. Ackermann, J. Blömer, and C. Sohler, “Clustering for Metric and Nonmetric Distance Measures,” ACM Trans. Algorithms, no. 4, pp. 59:1--59:26, 2010.
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2991
A. Krueger, V. Leutnant, R. Haeb-Umbach, M. Ackermann, and J. Blömer, “On the initialization of dynamic models for speech features,” Proc. of ITG Fachtagung Sprachkommunikation. ITG, Bochum, Germany, 2010.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2993
J. Schrieb, “Efficient and Compact CCA Security from Partitioned IBKEM.” 2010.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2994
W. Schäfer et al., “Engineering self-coordinating software intensive systems,” in Proceedings of the FSE/SDP workshop on Future of software engineering research - FoSER ’10, 2010.
LibreCat | DOI
 

2010 | Misc | LibreCat-ID: 47684 | OA
T. Postler, Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung. 2010.
LibreCat | Files available
 

Filters and Search Terms

department=64

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed