Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

229 Publications


2014 | Bachelorsthesis | LibreCat-ID: 2867
Sauer, M. (2014). Evaluierung von Initialisierungsmethoden für Fuzzy-k-means Algorithmen.
LibreCat
 

2014 | Conference Paper | LibreCat-ID: 355
Blömer, J., Günther, P., & Liske, G. (2014). Tampering attacks in pairing-based cryptography. In Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC) (pp. 1--7). https://doi.org/10.1109/FDTC.2014.10
LibreCat | Files available | DOI
 

2014 | Bachelorsthesis | LibreCat-ID: 369
Rath, T. (2014). RSA-Full Domain Hash Revisited. Universität Paderborn.
LibreCat
 

2014 | Mastersthesis | LibreCat-ID: 2900
Brauer, S. (2014). A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures.
LibreCat | Files available
 

2014 | Journal Article | LibreCat-ID: 2976
Ackermann, M. R., Blömer, J., Kuntze, D., & Sohler, C. (2014). Analysis of Agglomerative Clustering. Algorithmica, 69. https://doi.org/10.1007/s00453-012-9717-4
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 2977
Blömer, J., Bujna, K., & Kuntze, D. (2014). A Theoretical and Experimental Comparison of the EM and SEM Algorithm. In 2014 22nd International Conference on Pattern Recognition. IEEE. https://doi.org/10.1109/icpr.2014.253
LibreCat | DOI
 

2014 | Preprint | LibreCat-ID: 442 | OA
Blömer, J., & Liske, G. (2014). Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions. Universität Paderborn.
LibreCat | Files available | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 463
Blömer, J., Gomes da Silva, R., Günther, P., Krämer, J., & Seifert, J.-P. (2014). A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC) (pp. 123--136). https://doi.org/10.1109/FDTC.2014.22
LibreCat | Files available | DOI
 

2014 | Mastersthesis | LibreCat-ID: 414
Jochheim, J. (2014). Hiding software components using functional encryption. Universität Paderborn.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 416
Bemmann, P. (2014). Group Signature Schemes with Strong Exculpability. Universität Paderborn.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 421
Lippert, J. (2014). Fujisaki-Okamoto Transformation. Universität Paderborn.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2868
Laudemann, S. (2013). Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2869
Leder, L. (2013). Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken.
LibreCat
 

2013 | Dissertation | LibreCat-ID: 2909
Kuntze, D. (2013). Practical algorithms for clustering and modeling large data sets - Analysis and improvements. Universität Paderborn.
LibreCat | Download (ext.)
 

2013 | Report | LibreCat-ID: 2917
Juhnke, J., Lefmann, H., & Strehl, V. (2013). An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI.
LibreCat
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer, J., Günther, P., & Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In Constructive Side-Channel Analysis and Secure Design (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40026-1_10
LibreCat | DOI
 

2013 | Bachelorsthesis | LibreCat-ID: 471
Tezer, A. (2013). Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 486
Otte, O. (2013). Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
Bobolz, J. (2013). Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn.
LibreCat | Files available
 

2013 | Conference Paper | LibreCat-ID: 488
Blömer, J., Günther, P., & Krummel, V. (2013). Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) (pp. 98–105).
LibreCat | Files available
 

2013 | Preprint | LibreCat-ID: 538 | OA
Blömer, J., & Liske, G. (2013). Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. Universität Paderborn.
LibreCat | Files available | Download (ext.)
 

2013 | Bachelorsthesis | LibreCat-ID: 553
Kohn, K. (2013). Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 2982
Ackermann, M. R., Märtens, M., Raupach, C., Swierkot, K., Lammersen, C., & Sohler, C. (2012). StreamKM++: A clustering algorithm for data streams. New York, NY, USA: ACM. https://doi.org/10.1145/2133803.2184450
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 2984
Blömer, J. (2012). Turing und Kryptografie. Informatik-Spektrum, 35(4). https://doi.org/10.1007/s00287-012-0622-7
LibreCat | DOI
 

2012 | Bachelorsthesis | LibreCat-ID: 606
Löken, N. (2012). Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 607
Haarhoff, T. (2012). Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 629
Schleiter, P. (2012). Attribute-basierte Verschlüsselung. Universität Paderborn.
LibreCat
 

2011 | Bachelorsthesis | LibreCat-ID: 2872
Böttger, T. (2011). Bicriteria-Approximation für das k-Median-Clustering mit Bregman-Divergenzen.
LibreCat | Files available
 

2011 | Mastersthesis | LibreCat-ID: 2902
Märtens, M. (2011). The Monotone Complexity of Computing k-Clique on Random Graphs.
LibreCat
 

2011 | Dissertation | LibreCat-ID: 2910
Naewe, S. (2011). Algorithms for lattice problems with respect to general norms. Universität Paderborn.
LibreCat | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 2985
Ackermann, M. R., Blömer, J., & Scholz, C. (2011). Hardness and Non-Approximability of Bregman Clustering Problems.
LibreCat
 

2011 | Book Chapter | LibreCat-ID: 2986
Blömer, J. (2011). How to Share a Secret. In Algorithms Unplugged (pp. 159–168). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-15328-0_17
LibreCat | DOI
 

2011 | Preprint | LibreCat-ID: 2987
Blömer, J., & Naewe, S. (2011). Solving the Closest Vector Problem with respect to Lp Norms. ArXiv:1104.3720.
LibreCat
 

2011 | Mastersthesis | LibreCat-ID: 659
Liske, G. (2011). Fault attacks in pairing-based cryptography. Universität Paderborn.
LibreCat | Files available
 

2010 | Book Chapter | LibreCat-ID: 2988
Ackermann, M. R., & Blömer, J. (2010). Bregman Clustering for Separable Instances. In SWAT 2010 (pp. 212–223). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13731-0_21
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2990
Ackermann, M. R., Blömer, J., & Sohler, C. (2010). Clustering for Metric and Nonmetric Distance Measures. ACM Trans. Algorithms, (4), 59:1--59:26. https://doi.org/10.1145/1824777.1824779
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2991
Krueger, A., Leutnant, V., Haeb-Umbach, R., Ackermann, M., & Blömer, J. (2010). On the initialization of dynamic models for speech features. Proc. of ITG Fachtagung Sprachkommunikation. ITG, Bochum, Germany.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2993
Schrieb, J. (2010). Efficient and Compact CCA Security from Partitioned IBKEM.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2994
Schäfer, W., Trächtler, A., Birattari, M., Blömer, J., Dorigo, M., Engels, G., … Reif, W. (2010). Engineering self-coordinating software intensive systems. In Proceedings of the FSE/SDP workshop on Future of software engineering research - FoSER ’10. ACM Press. https://doi.org/10.1145/1882362.1882428
LibreCat | DOI
 

2010 | Misc | LibreCat-ID: 47684 | OA
Postler, T. (2010). Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung.
LibreCat | Files available
 

2009 | Bachelorsthesis | LibreCat-ID: 2880
Schröer, C. (2009). Hierarchisches Clustering mit minimalen Cluster-Durchmessern.
LibreCat | Files available
 

2009 | Bachelorsthesis | LibreCat-ID: 2896 | OA
Liske, G. (2009). Analyse und Evaluation eines identitätsbasierten Signcryption-Verfahrens.
LibreCat | Files available
 

2009 | Mastersthesis | LibreCat-ID: 2904
Scholz, C. (2009). Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen.
LibreCat | Files available
 

2009 | Dissertation | LibreCat-ID: 2911
Ackermann, M. R. (2009). Algorithms for the Bregman k-Median Problem. Universität Paderborn.
LibreCat | Download (ext.)
 

2009 | Book Chapter | LibreCat-ID: 2995
Ackermann, M. R., & Blömer, J. (2009). Coresets and Approximate Clustering for Bregman Divergences. In Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 1088–1097). Philadelphia, PA: Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973068.118
LibreCat | DOI
 

2009 | Journal Article | LibreCat-ID: 2999
Blömer, J., & Naewe, S. (2009). Sampling methods for shortest vectors, closest vectors and successive minima. Theoretical Computer Science, (18), 1648–1665. https://doi.org/10.1016/j.tcs.2008.12.045
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 3000
Schrieb, J., Wehrheim, H., & Wonisch, D. (2009). Three-Valued Spotlight Abstractions. In FM 2009: Formal Methods (pp. 106–122). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-05089-3_8
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3001
Stern, C., Adelt, P., Krummel, V., & Ackermann, M. R. (2008). Reliable Evidence of Data Integrity from an Untrusted Storage Service. In Fourth International Conference on Networking and Services (icns 2008). IEEE. https://doi.org/10.1109/icns.2008.28
LibreCat | DOI
 

2008 | Misc | LibreCat-ID: 47685 | OA
Schrieb, J. (2008). Construction and Applications of Identity-Based Encryption without Pairings.
LibreCat | Files available
 

2007 | Dissertation | LibreCat-ID: 2912
Krummel, V. (2007). Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn.
LibreCat | Download (ext.)
 

Filters and Search Terms

department=64

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed