Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5786 Publications


2015 | Journal Article | LibreCat-ID: 327
Kniesburges S, Koutsopoulos A, Scheideler C. A deterministic worst-case message complexity optimal solution for resource discovery. Theoretical Computer Science. 2015:67-79. doi:10.1016/j.tcs.2014.11.027
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 3364
Knorr C. Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten. Universität Paderborn; 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 3815
Wachsmuth H, Kiesel J, Stein B. Sentiment Flow - A General Model of Web Review Argumentation. In: Tsujii J, Hajic J, eds. Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing. Lecture Notes in Computer Science. ; 2015:601-611. doi:10.18653/v1/D15-1072
LibreCat | DOI | Download (ext.)
 

2015 | Book | LibreCat-ID: 3879
Wachsmuth H. Text Analysis Pipelines - Towards Ad-Hoc Large-Scale Text Mining.; 2015. doi:http://dx.doi.org/10.1007/978-3-319-25741-9
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 290
Besova G, Steenken D, Wehrheim H. Grammar-based model transformations: Definition, execution, and quality properties. Computer Languages, Systems & Structures. 2015:116-138. doi:10.1016/j.cl.2015.05.003
LibreCat | Files available | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak M. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn; 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken B. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn; 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz J. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh C. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn; 2015.
LibreCat
 

2015 | Dissertation | LibreCat-ID: 304
Koutsopoulos A. Dynamics and Efficiency in Topological Self-Stabilization. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Dissertation | LibreCat-ID: 305
Kniesburges S. Distributed Data Structures and the Power of Topological Self-Stabilization. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter P. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures From Standard Assumptions. J Cryptology. 2015;(1):176--208. doi:10.1007/s00145-014-9183-z
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ; 2015:1185--1196. doi:10.1145/2810103.2813657
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. ; 2015:407--425. doi:10.1007/978-3-319-24174-6_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of Practical Public-Key Encryption Schemes. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:27--51. doi:10.1007/978-3-662-46447-2_2
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:477--494. doi:10.1007/978-3-662-46447-2_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager T. Verifiable Random Functions from Weaker Assumptions. In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}. ; 2015:121--143. doi:10.1007/978-3-662-46497-7_5
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader C, Hofheinz D, Jager T, Kiltz E, Li Y. Tightly-Secure Authenticated Key Exchange. In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I. ; 2015:629--658. doi:10.1007/978-3-662-46494-6_26
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed