Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5711 Publications


2016 | Conference Paper | LibreCat-ID: 3117
Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic Reductions. In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. ; 2016:273--304. doi:10.1007/978-3-662-49896-5_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz D, Jager T, Rupp A. Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II. ; 2016:146--168. doi:10.1007/978-3-662-53644-5_6
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz D, Jager T. Verifiable Random Functions from Standard Assumptions. In: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I. ; 2016:336--362. doi:10.1007/978-3-662-49096-9_14
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3157
Beringer S, Wehrheim H. Verification of AUTOSAR Software Architectures with Timed Automata. In: H. ter Beek M, Gnesi S, Knapp A, eds. Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings. Lecture Notes in Computer Science. ; 2016:189--204. doi:10.1007/978-3-319-45943-1_13
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 3158
Travkin O, Wehrheim H. Verification of Concurrent Programs on Weak Memory Models. In: Sampaio A, Wang F, eds. Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings. Lecture Notes in Computer Science. ; 2016:3--24. doi:10.1007/978-3-319-46750-4_1
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3159
Schellhorn G, Travkin O, Wehrheim H. Towards a Thread-Local Proof Technique for Starvation Freedom. In: Huisman M, ed. Integrated Formal Methods - 12th International Conference, {IFM} 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Lecture Notes in Computer Science. ; 2016:193--209. doi:10.1007/978-3-319-33693-0_13
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3160
Doherty S, Dongol B, Derrick J, Schellhorn G, Wehrheim H. Proving Opacity of a Pessimistic {STM}. In: Fatourou P, Jim{\’{e}}nez E, Pedone F, eds. 20th International Conference on Principles of Distributed Systems, {OPODIS} 2016, December 13-16, 2016, Madrid, Spain. LIPIcs. ; 2016:35:1--35:17. doi:10.4230/LIPIcs.OPODIS.2016.35
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3161
Isenberg T, Jakobs M-}Christine, Pauck F, Wehrheim H. Deriving approximation tolerance constraints from verification runs. CoRR. 2016.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 210
Leder L. Congestion Games with Mixed Objectives. Universität Paderborn; 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim L. Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes. Universität Paderborn; 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann KS. Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn; 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 215
Drees M, Gmyr R, Scheideler C. Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration. In: Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA). ; 2016:417--427. doi:10.1145/2935764.2935783
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 175
Walther S, Wehrheim H. On-The-Fly Construction of Provably Correct Service Compositions - Templates and Proofs. Science of Computer Programming. 2016:2--23. doi:10.1016/j.scico.2016.04.002
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 17655
Polevoy G, de Weerdt MM, Jonker CM. The Game of Reciprocation Habits. In: Proceedings of the 2016 European Conference on Artificial Intelligence. Vol Volume 285: ECAI 2016. Frontiers in Artificial Intelligence and Applications. ; 2016:417-425. doi:10.3233/978-1-61499-672-9-417
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 17656
Polevoy G, de Weerdt M, Jonker C. The Convergence of Reciprocation. In: Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems. AAMAS ’16. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems; 2016:1431-1432.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 177
Abu-Khzam FN, Li S, Markarian C, Meyer auf der Heide F, Podlipyan P. On the Parameterized Parallel Complexity and the Vertex Cover Problem. In: Proceedings of the 10th International Conference on Combinatorial Optimization and Applications (COCOA). LNCS. ; 2016:477-488. doi:10.1007/978-3-319-48749-6_35
LibreCat | Files available | DOI
 

2016 | Special Issue | LibreCat-ID: 187
Meyer auf der Heide F, ed. Introduction to the Special Issue on SPAA 2014.; 2016. doi:10.1145/2936716
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 19
Lass M, Leibenger D, Sorge C. Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In: Proc. 41st Conference on Local Computer Networks (LCN). IEEE; 2016. doi:10.1109/lcn.2016.11
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 190
Platenius MC, Shaker A, Becker M, Hüllermeier E, Schäfer W. Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic. IEEE Transactions on Software Engineering (TSE), presented at ICSE 2017. 2016;(8):739-759. doi:10.1109/TSE.2016.2632115
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 2367
Blömer J, Brauer S, Bujna K. A Theoretical Analysis of the Fuzzy K-Means Problem. In: 2016 IEEE 16th International Conference on Data Mining (ICDM). IEEE; 2016:805-810. doi:10.1109/icdm.2016.0094
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20556
Bodden E, I Pun K, Steffen M, Stolz V, Wickert A-K. Information Flow Analysis for Go. In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}. ; 2016:431-445. doi:10.1007/978-3-319-47166-2_30
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 207
Mäcker A, Malatyali M, Meyer auf der Heide F, Riechers S. Cost-efficient Scheduling on Machines from the Cloud. In: Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA). ; 2016:578--592. doi:10.1007/978-3-319-48749-6_42
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 20716
Bodden E, Eichberg M, I Pun K, Steffen M, Stolz V, Wickert A-K. Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go. In: Nordic Workshop on Programming Theory (NWPT’16). ; 2016.
LibreCat | Download (ext.)
 

2016 | Report | LibreCat-ID: 20717
Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Just-in-Time Static Analysis.; 2016. doi:http://dx.doi.org/10.7939/DVN/10859
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20718
Rasthofer S, Arzt S, Bodden E, Miltenberger M. Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. Datenschutz und Datensicherheit. Published online 2016:718-722. doi:https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20719
Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS ’16. ; 2016:779-790. doi:http://doi.acm.org/10.1145/2976749.2978361
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20720
Follner A, Bartel A, Peng H, et al. PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. In: International Workshop on Security and Trust Management (STM). ; 2016:212-228.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20721
Nguyen Quang Do L, Eichberg M, Bodden E. Toward an Automated Benchmark Management System. In: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. SOAP 2016. ; 2016:13-17.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20722
Arzt S, Kussmaul T, Bodden E. Towards Cross-Platform Cross-Language Analysis with Soot. In: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. SOAP 2016. ; 2016:1-6.
LibreCat | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20724
Follner A, Bodden E. ROPocop — Dynamic mitigation of code-reuse attacks. Journal of Information Security and Applications . 2016;29:16-26. doi:http://dx.doi.org/10.1016/j.jisa.2016.01.002
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20725
Follner A, Bartel A, Bodden E. Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. In: International Symposium on Engineering Secure Software and Systems (ESSoS). ; 2016.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20726
Falzon K, Bodden E. Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. In: Piessens F, Vigan’o L, eds. Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings. Springer Berlin Heidelberg; 2016:116-138. doi:10.1007/978-3-662-49635-0_7
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20727
Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In: Network and Distributed System Security Symposium (NDSS). ; 2016.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20728
Nadi S, Krüger S, Mezini M, Bodden E. Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? In: International Conference for Software Engineering (ICSE). ; 2016:935-946.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20729
Arzt S, Bodden E. StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. In: International Conference for Software Engineering (ICSE). ; 2016.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20730
Eling N, Rasthofer S, Kolhagen M, Bodden E, Buxmann P. Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment. In: 2016 49th Hawaii International Conference on System Sciences (HICSS). ; 2016:3666-3675. doi:10.1109/HICSS.2016.458
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 208
Blömer J, Liske G. Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. In: Proceedings of the CT-RSA 2016. LNCS. ; 2016:431-447. doi:10.1007/978-3-319-29485-8_25
LibreCat | Files available | DOI
 

2016 | Report | LibreCat-ID: 20822
Dziwok S, Pohlmann U, Piskachev G, Schubert D, Thiele S, Gerking C. The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling.; 2016.
LibreCat
 

2016 | Report | LibreCat-ID: 20823
Holtmann J, Fockel M, Koch T, et al. The MechatronicUML Requirements Engineering Method: Process and Language.; 2016. doi:10.13140/RG.2.2.33223.29606
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20825
Greinert M, Tschirner C, Holtmann J. Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. In: Tag Des Systems Engineering 2016. Gesellschaft f{\"u}r Systems Engineering e.V.; 2016:77-86. doi:10.3139/9783446451414.008
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20830
Schubert D, Heinzemann C, Gerking C. Towards Safe Execution of Reconfigurations in Cyber-Physical Systems. In: Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering. ACM; 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 209
Feldotto M, Leder L, Skopalik A. Congestion Games with Mixed Objectives. In: Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA). LNCS. ; 2016:655--669. doi:10.1007/978-3-319-48749-6_47
LibreCat | Files available | DOI | arXiv
 

2016 | Bachelorsthesis | LibreCat-ID: 18025
Heuchler S. Nibbler: Implementing a Turing Machine to Simulate the Busy Beaver Problem.; 2016.
LibreCat
 

2016 | Journal Article | LibreCat-ID: 1835
Schmid S, Avin C, Scheideler C, Borokhovich M, Haeupler B, Lotker Z. SplayNet: Towards Locally Self-Adjusting Networks. IEEE/ACM Trans Netw. 2016;(3):1421--1433. doi:10.1109/TNET.2015.2410313
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 1836
Derakhshandeh Z, Gmyr R, Porter A, W. Richa A, Scheideler C, Strothmann TF. On the Runtime of Universal Coating for Programmable Matter. In: DNA Computing and Molecular Programming - 22nd International Conference, DNA 22, Munich, Germany, September 4-8, 2016, Proceedings. Vol 9818. Lecture Notes in Computer Science. ; 2016:148--164. doi:10.1007/978-3-319-43994-5_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 1837
Derakhshandeh Z, Gmyr R, W. Richa A, Scheideler C, Strothmann TF. Universal Shape Formation for Programmable Matter. In: Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2016, Asilomar State Beach/Pacific Grove, CA, USA, July 11-13, 2016. ACM; 2016:289--299. doi:10.1145/2935764.2935784
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 184
Melnikov V, Hüllermeier E. Learning to Aggregate Using Uninorms. In: Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases (ECML/PKDD 2016). LNCS. ; 2016:756-771. doi:10.1007/978-3-319-46227-1_47
LibreCat | Files available | DOI
 

2016 | Conference (Editor) | LibreCat-ID: 1844
Scheideler C, Gilbert S, eds. Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2016, Asilomar State Beach/Pacific Grove, CA, USA, July 11-13, 2016.; 2016. doi:10.1145/2935764
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 1845
W. Richa A, Scheideler C. Jamming-Resistant MAC Protocols for Wireless Networks. In: Encyclopedia of Algorithms. ; 2016:999--1002. doi:10.1007/978-1-4939-2864-4_593
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 186
Czech M, Jakobs M-C, Wehrheim H. Just test what you cannot verify! In: Jens Knoop UZ, ed. Software Engineering 2016. Lecture Notes in Informatics. ; 2016:17-18.
LibreCat | Files available
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed