Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5711 Publications


2015 | Conference Paper | LibreCat-ID: 241
Towards Establishing Monotonic Searchability in Self-Stabilizing Data Structures
C. Scheideler, A. Setzer, T.F. Strothmann, in: Proceedings of the 19th International Conference on Principles of Distributed Systems (OPODIS), 2015.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 242
Towards a Universal Approach for the Finite Departure Problem in Overlay Networks
A. Koutsopoulos, C. Scheideler, T.F. Strothmann, in: Proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2015, pp. 201–216.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 243
The impact of communication patterns on distributed locally self-adjusting binary search trees
T.F. Strothmann, in: Proceedings of the 9th International Workshop on Algorithms and Computation (WALCOM), 2015, pp. 175--186.
LibreCat | Files available | DOI
 

2015 | Dissertation | LibreCat-ID: 246
Systematic Development and Re-Use of Model Tranformations
G. Besova, Systematic Development and Re-Use of Model Tranformations, Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 247
SynRace: Decentralized Load-Adaptive Multi-path Routing without Collecting Statistics
A. Schwabe, H. Karl, in: Proceedings of the 4th European Workshop on Software Defined Networks (EWSDN 2015), 2015, pp. 37–42.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 261
Protokolle zur authentifizierten Schüsselvereinbarung
T. Eisenhofer, Protokolle zur authentifizierten Schüsselvereinbarung, Universität Paderborn, 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 262
Programs from Proofs of Predicated Dataflow Analyses
M.-C. Jakobs, H. Wehrheim, in: Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015, pp. 1729–1736.
LibreCat | Files available | DOI
 

2015 | Dissertation | LibreCat-ID: 264
Optimizing Software-Defined Networks using Application-Layer Knowledge
P. Wette, Optimizing Software-Defined Networks Using Application-Layer Knowledge, Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Book | LibreCat-ID: 26446
DeLFI 2015 - The 13th e-Learning Conference on Computer Science of the E-Learning Section of the Society for Computer Science eV
H. Pongratz, R. Keil, DeLFI 2015 - The 13th e-Learning Conference on Computer Science of the E-Learning Section of the Society for Computer Science EV, Koellen Druck + Verlag GmbH, 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 26449
WebArena - R {\ "a} spacious structures for {\" u} r the learning locations of the future
F. Winkelnkemper, A. Oberhoff, in: R. wedge, H. Selke (Eds.), Publication series of the Heinz Nixdorf Institute, Paderborn, 2015, pp. 103–117.
LibreCat
 

2015 | Book (Editor) | LibreCat-ID: 26531
20 years of learning with the World Wide Web - technology and education in dialogue
R. Keil, H. Selke, eds., 20 Years of Learning with the World Wide Web - Technology and Education in Dialogue, publishing series of the Heinz Nixdorf Institute, Paderborn, 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 26532
Learn with, through and {\ "about the WWW
R. Keil, H. Selke, in: R. Keil, H. Selke (Eds.), Publishing series of the Heinz Nixdorf Institute, Paderborn, 2015, pp. 1–7.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 26533
Virtual knowledge {\ "a} ume - From the presentation of content to virtual learning {\" a} tten
R. Keil, H. Selke, in: R. Keil, H. Selke (Eds.), publishing series of the Heinz Nixdorf Institute, Paderborn, 2015, pp. 39–53.
LibreCat
 

2015 | Dissertation | LibreCat-ID: 26534
Development of a structured process of interaction design for {\ "u} r nat {\" u} local user interfaces
F. Klompmaker, Development of a Structured Process of Interaction Design for {\ “U} r Nat {\” U} Local User Interfaces, Universitaetsbibliothek Paderborn, Universit {\ "a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer Science, 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 26536
Empirical validation of design patterns
C. Schild, V. Petrausch, in: Human and Computer 2015 - Proceedings, De Gruyter Oldenbourg, Berlin, 2015, pp. 173–182.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 266
Online Resource Leasing
C. Markarian, F. Meyer auf der Heide, in: Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC), 2015, pp. 343–344.
LibreCat | Files available | DOI
 

2015 | Dissertation | LibreCat-ID: 267
Online Resource Leasing
C. Markarian, Online Resource Leasing, Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 269
On-The-Fly Verification of Reconfigurable Image Processing Modules based on a Proof-Carrying Hardware Approach
T. Wiersema, S. Wu, M. Platzner, in: Proceedings of the International Symposium in Reconfigurable Computing (ARC), 2015, pp. 365--372.
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 320
Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure
I. Caragiannis, A. Fanelli, N. Gravin, A. Skopalik, Transactions on Economics and Computation 3 (2015).
LibreCat | Files available | DOI
 

2015 | Mastersthesis | LibreCat-ID: 321
Anonymous credential system based on q-Strong Diffie-Hellman Assumption
F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption, Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 322 | OA
Anonymous and Publicly Linkable Reputation Systems
J. Blömer, J. Juhnke, C. Kolb, in: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Journal Article | LibreCat-ID: 323
An approach towards adaptive service composition in markets of composed services
A. Jungmann, F. Mohr, Journal of Internet Services and Applications (2015) 1–18.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 324
A Metric for Functional Reusability of Services
F. Mohr, in: Proceedings of the 14th International Conference on Software Reuse (ICSR), 2015, pp. 298--313.
LibreCat | Files available | DOI
 

2015 | Mastersthesis | LibreCat-ID: 325
A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption, Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 326
A group signature scheme based on the LSRW assumption
F. Heihoff, A Group Signature Scheme Based on the LSRW Assumption, Universität Paderborn, 2015.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 327
A deterministic worst-case message complexity optimal solution for resource discovery
S. Kniesburges, A. Koutsopoulos, C. Scheideler, Theoretical Computer Science (2015) 67–79.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 3364
Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten
C. Knorr, Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten, Universität Paderborn, 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 3815
Sentiment Flow - A General Model of Web Review Argumentation
H. Wachsmuth, J. Kiesel, B. Stein, in: J. Tsujii, J. Hajic (Eds.), Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015, pp. 601–611.
LibreCat | DOI | Download (ext.)
 

2015 | Book | LibreCat-ID: 3879
Text Analysis Pipelines - Towards Ad-hoc Large-scale Text Mining
H. Wachsmuth, Text Analysis Pipelines - Towards Ad-Hoc Large-Scale Text Mining, 2015.
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 290
Grammar-based model transformations: Definition, execution, and quality properties
G. Besova, D. Steenken, H. Wehrheim, Computer Languages, Systems & Structures (2015) 116–138.
LibreCat | Files available | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Tightly-Secure Signatures from Chameleon Hash Functions
O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.
LibreCat | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 297
Evaluation of Pairing Optimization for Embedded Platforms
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms, Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie, Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Efficient Verifier-Local Revocation for Anonymous Credentials
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials, Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Efficient Attributes for Pairing-Based Anonymous Credentials
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität Paderborn, 2015.
LibreCat
 

2015 | Dissertation | LibreCat-ID: 304
Dynamics and Efficiency in Topological Self-Stabilization
A. Koutsopoulos, Dynamics and Efficiency in Topological Self-Stabilization, Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Dissertation | LibreCat-ID: 305
Distributed Data Structures and the Power of topological Self-Stabilization
S. Kniesburges, Distributed Data Structures and the Power of Topological Self-Stabilization, Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 312
Constructions of Fully Secure Predicate Encryption Schemes
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes, Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 3120
Confined Guessing: New Signatures From Standard Assumptions
F. Böhl, D. Hofheinz, T. Jager, J. Koch, C. Striecks, J. Cryptology (2015) 176--208.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Practical Invalid Curve Attacks on TLS-ECDH
T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
On the Selective Opening Security of Practical Public-Key Encryption Schemes
F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Verifiable Random Functions from Weaker Assumptions
T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Tightly-Secure Authenticated Key Exchange
C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 313
Comprehensive Service Matching with MatchBox
P. Börding, M. Bruns, M.C. Platenius, in: 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 316
Budget Games with priced strategies
J. Pautz, Budget Games with Priced Strategies, Universität Paderborn, 2015.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 3162
Temporal plans for software architecture reconfiguration
S. Ziegert, H. Wehrheim, Computer Science - R & D (2015) 303--320.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 3163
From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog
R. Meyer, H. Wehrheim, in: R. Meyer, A. Platzer, H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015, pp. 3--4.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3164
Verifying Opacity of a Transactional Mutex Lock
J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\o}rner, F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Export / Embed