Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5786 Publications


2015 | Journal Article | LibreCat-ID: 327
Kniesburges, Sebastian, et al. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” Theoretical Computer Science, Elsevier, 2015, pp. 67–79, doi:10.1016/j.tcs.2014.11.027.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 3364
Knorr, Christoph. Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten. Universität Paderborn, 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 3815
Wachsmuth, Henning, et al. “Sentiment Flow - A General Model of Web Review Argumentation.” Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, edited by Junichi Tsujii and Jan Hajic, 2015, pp. 601–11, doi:10.18653/v1/D15-1072.
LibreCat | DOI | Download (ext.)
 

2015 | Book | LibreCat-ID: 3879
Wachsmuth, Henning. Text Analysis Pipelines - Towards Ad-Hoc Large-Scale Text Mining. 2015, doi:http://dx.doi.org/10.1007/978-3-319-25741-9.
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 290
Besova, Galina, et al. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” Computer Languages, Systems & Structures, Elsevier, 2015, pp. 116–38, doi:10.1016/j.cl.2015.05.003.
LibreCat | Files available | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.” Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2015, pp. 256–79, doi:10.1007/978-3-662-46447-2_12.
LibreCat | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak, Martin. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken, Britta. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz, Jan. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh, Christian. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn, 2015.
LibreCat
 

2015 | Dissertation | LibreCat-ID: 304
Koutsopoulos, Andreas. Dynamics and Efficiency in Topological Self-Stabilization. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Dissertation | LibreCat-ID: 305
Kniesburges, Sebastian. Distributed Data Structures and the Power of Topological Self-Stabilization. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter, Patrick. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl, Florian, et al. “Confined Guessing: New Signatures From Standard Assumptions.” J. Cryptology, no. 1, 2015, pp. 176--208, doi:10.1007/s00145-014-9183-z.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196, doi:10.1145/2810103.2813657.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425, doi:10.1007/978-3-319-24174-6_21.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer, Felix, et al. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51, doi:10.1007/978-3-662-46447-2_2.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, Florian, et al. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494, doi:10.1007/978-3-662-46447-2_21.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143, doi:10.1007/978-3-662-46497-7_5.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader, Christoph, et al. “Tightly-Secure Authenticated Key Exchange.” Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658, doi:10.1007/978-3-662-46494-6_26.
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export / Embed