Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5943 Publications


2015 | Mastersthesis | LibreCat-ID: 325
Löken, Nils. A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 326
Heihoff, Frederic. A Group Signature Scheme Based on the LSRW Assumption. Universität Paderborn, 2015.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 327
Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” Theoretical Computer Science, 2015, 67–79. https://doi.org/10.1016/j.tcs.2014.11.027.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 3364
Knorr, Christoph. Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten. Universität Paderborn, 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 3815
Wachsmuth, Henning, Johannes Kiesel, and Benno Stein. “Sentiment Flow - A General Model of Web Review Argumentation.” In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, edited by Junichi Tsujii and Jan Hajic, 601–11. Lecture Notes in Computer Science, 2015. https://doi.org/10.18653/v1/D15-1072.
LibreCat | DOI | Download (ext.)
 

2015 | Book | LibreCat-ID: 3879
Wachsmuth, Henning. Text Analysis Pipelines - Towards Ad-Hoc Large-Scale Text Mining. Lecture Notes in Computer Science, 2015. http://dx.doi.org/10.1007/978-3-319-25741-9.
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 290
Besova, Galina, Dominik Steenken, and Heike Wehrheim. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” Computer Languages, Systems & Structures, 2015, 116–38. https://doi.org/10.1016/j.cl.2015.05.003.
LibreCat | Files available | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure Signatures from Chameleon Hash Functions.” In Lecture Notes in Computer Science, 256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. https://doi.org/10.1007/978-3-662-46447-2_12.
LibreCat | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak, Martin. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken, Britta. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz, Jan. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh, Christian. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn, 2015.
LibreCat
 

2015 | Dissertation | LibreCat-ID: 304
Koutsopoulos, Andreas. Dynamics and Efficiency in Topological Self-Stabilization. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Dissertation | LibreCat-ID: 305
Kniesburges, Sebastian. Distributed Data Structures and the Power of Topological Self-Stabilization. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter, Patrick. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph Striecks. “Confined Guessing: New Signatures From Standard Assumptions.” J. Cryptology, no. 1 (2015): 176--208. https://doi.org/10.1007/s00145-014-9183-z.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 1185--1196, 2015. https://doi.org/10.1145/2810103.2813657.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 407--425, 2015. https://doi.org/10.1007/978-3-319-24174-6_21.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer, Felix, Tibor Jager, Eike Kiltz, and Sven Schäge. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 27--51, 2015. https://doi.org/10.1007/978-3-662-46447-2_2.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, Florian, Tibor Jager, and Jörg Schwenk. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 477--494, 2015. https://doi.org/10.1007/978-3-662-46447-2_21.
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed