Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5711 Publications


2016 | Conference Paper | LibreCat-ID: 3117
Bader, C., Jager, T., Li, Y., & Schäge, S. (2016). On the Impossibility of Tight Cryptographic Reductions. In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (pp. 273--304). https://doi.org/10.1007/978-3-662-49896-5_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz, D., Jager, T., & Rupp, A. (2016). Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II (pp. 146--168). https://doi.org/10.1007/978-3-662-53644-5_6
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz, D., & Jager, T. (2016). Verifiable Random Functions from Standard Assumptions. In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I (pp. 336--362). https://doi.org/10.1007/978-3-662-49096-9_14
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3157
Beringer, S., & Wehrheim, H. (2016). Verification of AUTOSAR Software Architectures with Timed Automata. In M. H. ter Beek, S. Gnesi, & A. Knapp (Eds.), Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings (pp. 189--204). https://doi.org/10.1007/978-3-319-45943-1_13
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 3158
Travkin, O., & Wehrheim, H. (2016). Verification of Concurrent Programs on Weak Memory Models. In A. Sampaio & F. Wang (Eds.), Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings (pp. 3--24). https://doi.org/10.1007/978-3-319-46750-4_1
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3159
Schellhorn, G., Travkin, O., & Wehrheim, H. (2016). Towards a Thread-Local Proof Technique for Starvation Freedom. In M. Huisman (Ed.), Integrated Formal Methods - 12th International Conference, {IFM} 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings (pp. 193--209). https://doi.org/10.1007/978-3-319-33693-0_13
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3160
Doherty, S., Dongol, B., Derrick, J., Schellhorn, G., & Wehrheim, H. (2016). Proving Opacity of a Pessimistic {STM}. In P. Fatourou, E. Jim{\’{e}}nez, & F. Pedone (Eds.), 20th International Conference on Principles of Distributed Systems, {OPODIS} 2016, December 13-16, 2016, Madrid, Spain (pp. 35:1--35:17). https://doi.org/10.4230/LIPIcs.OPODIS.2016.35
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3161
Isenberg, T., Jakobs, M.-}Christine, Pauck, F., & Wehrheim, H. (2016). Deriving approximation tolerance constraints from verification runs. CoRR.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 210
Leder, L. (2016). Congestion Games with Mixed Objectives. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim, L. (2016). Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann, K. S. (2016). Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 215
Drees, M., Gmyr, R., & Scheideler, C. (2016). Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration. In Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) (pp. 417--427). https://doi.org/10.1145/2935764.2935783
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 175
Walther, S., & Wehrheim, H. (2016). On-The-Fly Construction of Provably Correct Service Compositions - Templates and Proofs. Science of Computer Programming, 2--23. https://doi.org/10.1016/j.scico.2016.04.002
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 17655
Polevoy, G., de Weerdt, M. M., & Jonker, C. M. (2016). The Game of Reciprocation Habits. In Proceedings of the 2016 European Conference on Artificial Intelligence (Vol. Volume 285: ECAI 2016, pp. 417–425). https://doi.org/10.3233/978-1-61499-672-9-417
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 17656
Polevoy, G., de Weerdt, M., & Jonker, C. (2016). The Convergence of Reciprocation. In Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems (pp. 1431–1432). Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 177
Abu-Khzam, F. N., Li, S., Markarian, C., Meyer auf der Heide, F., & Podlipyan, P. (2016). On the Parameterized Parallel Complexity and the Vertex Cover Problem. In Proceedings of the 10th International Conference on Combinatorial Optimization and Applications (COCOA) (pp. 477–488). https://doi.org/10.1007/978-3-319-48749-6_35
LibreCat | Files available | DOI
 

2016 | Special Issue | LibreCat-ID: 187
Meyer auf der Heide, F. (Ed.). (2016). Introduction to the Special Issue on SPAA 2014. Transactions on Parallel Computing (TOPC). https://doi.org/10.1145/2936716
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 19
Lass, M., Leibenger, D., & Sorge, C. (2016). Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In Proc. 41st Conference on Local Computer Networks (LCN). IEEE. https://doi.org/10.1109/lcn.2016.11
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 190
Platenius, M. C., Shaker, A., Becker, M., Hüllermeier, E., & Schäfer, W. (2016). Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic. IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017, (8), 739–759. https://doi.org/10.1109/TSE.2016.2632115
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 2367
Blömer, J., Brauer, S., & Bujna, K. (2016). A Theoretical Analysis of the Fuzzy K-Means Problem. In 2016 IEEE 16th International Conference on Data Mining (ICDM) (pp. 805–810). Barcelona, Spain: IEEE. https://doi.org/10.1109/icdm.2016.0094
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20556
Bodden, E., I Pun, K., Steffen, M., Stolz, V., & Wickert, A.-K. (2016). Information Flow Analysis for Go. Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 431–445. https://doi.org/10.1007/978-3-319-47166-2_30
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 207
Mäcker, A., Malatyali, M., Meyer auf der Heide, F., & Riechers, S. (2016). Cost-efficient Scheduling on Machines from the Cloud. In Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA) (pp. 578--592). https://doi.org/10.1007/978-3-319-48749-6_42
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 20716
Bodden, E., Eichberg, M., I Pun, K., Steffen, M., Stolz, V., & Wickert, A.-K. (2016). Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go. Nordic Workshop on Programming Theory (NWPT’16).
LibreCat | Download (ext.)
 

2016 | Report | LibreCat-ID: 20717
Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., & Murphy-Hill, E. (2016). Just-in-Time Static Analysis. http://dx.doi.org/10.7939/DVN/10859
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20718
Rasthofer, S., Arzt, S., Bodden, E., & Miltenberger, M. (2016). Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. Datenschutz Und Datensicherheit, 718–722. https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20719
Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–790. http://doi.acm.org/10.1145/2976749.2978361
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20720
Follner, A., Bartel, A., Peng, H., Chang, Y.-C., Ispoglou, K., Payer, M., & Bodden, E. (2016). PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. International Workshop on Security and Trust Management (STM), 212–228.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20721
Nguyen Quang Do, L., Eichberg, M., & Bodden, E. (2016). Toward an Automated Benchmark Management System. Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 13–17.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20722
Arzt, S., Kussmaul, T., & Bodden, E. (2016). Towards Cross-Platform Cross-Language Analysis with Soot. Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 1–6.
LibreCat | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20724
Follner, A., & Bodden, E. (2016). ROPocop — Dynamic mitigation of code-reuse attacks. Journal of Information Security and Applications , 29, 16–26. http://dx.doi.org/10.1016/j.jisa.2016.01.002
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20725
Follner, A., Bartel, A., & Bodden, E. (2016). Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. International Symposium on Engineering Secure Software and Systems (ESSoS).
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20726
Falzon, K., & Bodden, E. (2016). Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. In F. Piessens & L. Vigan’o (Eds.), Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings (pp. 116–138). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-49635-0_7
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20727
Rasthofer, S., Arzt, S., Miltenberger, M., & Bodden, E. (2016). Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. Network and Distributed System Security Symposium (NDSS).
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20728
Nadi, S., Krüger, S., Mezini, M., & Bodden, E. (2016). Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? International Conference for Software Engineering (ICSE), 935–946.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20729
Arzt, S., & Bodden, E. (2016). StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. International Conference for Software Engineering (ICSE).
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20730
Eling, N., Rasthofer, S., Kolhagen, M., Bodden, E., & Buxmann, P. (2016). Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment. 2016 49th Hawaii International Conference on System Sciences (HICSS), 3666–3675. https://doi.org/10.1109/HICSS.2016.458
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 208
Blömer, J., & Liske, G. (2016). Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. In Proceedings of the CT-RSA 2016 (pp. 431–447). https://doi.org/10.1007/978-3-319-29485-8_25
LibreCat | Files available | DOI
 

2016 | Report | LibreCat-ID: 20822
Dziwok, S., Pohlmann, U., Piskachev, G., Schubert, D., Thiele, S., & Gerking, C. (2016). The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling.
LibreCat
 

2016 | Report | LibreCat-ID: 20823
Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov, R., & Sander, M. (2016). The MechatronicUML Requirements Engineering Method: Process and Language. https://doi.org/10.13140/RG.2.2.33223.29606
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20825
Greinert, M., Tschirner, C., & Holtmann, J. (2016). Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. Tag Des Systems Engineering 2016, 77–86. https://doi.org/10.3139/9783446451414.008
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20830
Schubert, D., Heinzemann, C., & Gerking, C. (2016). Towards Safe Execution of Reconfigurations in Cyber-Physical Systems. Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 209
Feldotto, M., Leder, L., & Skopalik, A. (2016). Congestion Games with Mixed Objectives. In Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA) (pp. 655--669). https://doi.org/10.1007/978-3-319-48749-6_47
LibreCat | Files available | DOI | arXiv
 

2016 | Bachelorsthesis | LibreCat-ID: 18025
Heuchler, S. (2016). Nibbler: Implementing a Turing machine to simulate the Busy Beaver problem.
LibreCat
 

2016 | Journal Article | LibreCat-ID: 1835
Schmid, S., Avin, C., Scheideler, C., Borokhovich, M., Haeupler, B., & Lotker, Z. (2016). SplayNet: Towards Locally Self-Adjusting Networks. IEEE/ACM Trans. Netw., (3), 1421--1433. https://doi.org/10.1109/TNET.2015.2410313
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 1836
Derakhshandeh, Z., Gmyr, R., Porter, A., W. Richa, A., Scheideler, C., & Strothmann, T. F. (2016). On the Runtime of Universal Coating for Programmable Matter. In DNA Computing and Molecular Programming - 22nd International Conference, DNA 22, Munich, Germany, September 4-8, 2016, Proceedings (Vol. 9818, pp. 148--164). https://doi.org/10.1007/978-3-319-43994-5_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 1837
Derakhshandeh, Z., Gmyr, R., W. Richa, A., Scheideler, C., & Strothmann, T. F. (2016). Universal Shape Formation for Programmable Matter. In Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2016, Asilomar State Beach/Pacific Grove, CA, USA, July 11-13, 2016 (pp. 289--299). ACM. https://doi.org/10.1145/2935764.2935784
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 184
Melnikov, V., & Hüllermeier, E. (2016). Learning to Aggregate Using Uninorms. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases (ECML/PKDD 2016) (pp. 756–771). https://doi.org/10.1007/978-3-319-46227-1_47
LibreCat | Files available | DOI
 

2016 | Conference (Editor) | LibreCat-ID: 1844
Scheideler, C., & Gilbert, S. (Eds.). (2016). Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2016, Asilomar State Beach/Pacific Grove, CA, USA, July 11-13, 2016. https://doi.org/10.1145/2935764
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 1845
W. Richa, A., & Scheideler, C. (2016). Jamming-Resistant MAC Protocols for Wireless Networks. In Encyclopedia of Algorithms (pp. 999--1002). https://doi.org/10.1007/978-1-4939-2864-4_593
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 186
Czech, M., Jakobs, M.-C., & Wehrheim, H. (2016). Just test what you cannot verify! In U. Z. Jens Knoop (Ed.), Software Engineering 2016 (pp. 17–18).
LibreCat | Files available
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed