Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

10577 Publications


2012 | Book Chapter | LibreCat-ID: 26025
Process integrated wire-bond quality control by means of cytokine-Formal Immune Networks
N. Montealegre, S. Hagenkötter, in: Journal of Intelligent Manufacturing 23(3), Published online on June 2010, 2012, pp. 699–715.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 26081
Real-Time Android: Deterministic Ease of use
W. Mauerer, G. Hillier, J. Sawallisch, S. Hönick, S. Oberthür, in: Proceedings of Embedded World Conference, 2012.
LibreCat
 

2012 | Journal Article | LibreCat-ID: 26091
Deployment of mobile routers ensuring coverage and connectivity
E. Mathews, C. Mathew, International Journal of Computer Networks and Communications 4(1) (2012) 175–192.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 3449
Softwaregestützte Konstruktion von Produktivitätsmodellen im Facility Management
J. Becker, T. Bernhold, D. Beverungen, N. Kaling, R. Knackstedt, L. Vanesa, H. Peter Rauer, in: Dienstleistungsmodellierung 2012, Wiesbaden, 2012, pp. 208--226.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2918
Certifying RSA
S. Kakvi, E. Kiltz, A. May, in: Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 404–414.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Optimal Security Proofs for Full Domain Hash, Revisited
S. Kakvi, E. Kiltz, in: Advances in Cryptology – EUROCRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 537–553.
LibreCat | DOI | Download (ext.)
 

2012 | Dissertation | LibreCat-ID: 3132
On black-box models of computation in cryptology
T. Jager, On Black-Box Models of Computation in Cryptology, Ruhr University Bochum, 2012.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 3133
On the Security of TLS-DHE in the Standard Model
T. Jager, F. Kohlar, S. Schäge, J. Schwenk, in: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 273--293.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3134
Tightly Secure Signatures and Public-Key Encryption
D. Hofheinz, T. Jager, in: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 590--607.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3135
Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
T. Jager, S. Schinzel, J. Somorovsky, in: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 2012, pp. 752--769.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3136
Waters Signatures with Optimal Security Reduction
D. Hofheinz, T. Jager, E. Knapp, in: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 2012, pp. 66--83.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3182
How to Prove Algorithms Linearisable
G. Schellhorn, H. Wehrheim, J. Derrick, in: P. Madhusudan, S. A. Seshia (Eds.), Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, 2012, pp. 243--259.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 27176
Computer science and society as a field of computer science
D. Engbring, H. Selke, 5 (2012) 111–116.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 1127 | OA
Scientific Literature Retrieval based on Terminological Paraphrases using Predicate Argument Tuple
S.-P. Choi, S. Song, H. Jung, M. Geierhos, S.H. Myaeng, in: C.-C. Chang, Y.E. Gelogo, R.E. Caytiles (Eds.), Information Science and Industrial Applications: Proceedings, International Conference, ISI 2012, Cebu, Philippines, May 2012, SERSC, Sandy Bay, Australia, 2012, pp. 371–378.
LibreCat | Download (ext.)
 

2012 | Conference Paper | LibreCat-ID: 1128 | OA
A Proof-of-Concept of D³ Record Mining using Domain-Dependent Data
Y.S. Lee, M. Geierhos, S.-K. Song, H. Jung, in: C.-C. Chang, Y.E. Gelogo, R.E. Caytiles (Eds.), Software Technology: Prooceedings, International Conference, SoftTech 2012, Cebu, Philippines, May 2012, SERSC, Sandy Bay, Australia, 2012, pp. 134–139.
LibreCat | Download (ext.)
 

2012 | Book Chapter | LibreCat-ID: 1129
Customer Interaction Management goes Social: Getting Business Processes plugged in Social Networks
M. Geierhos, M. Ebrahim, in: A. Abraham, A.-E. Hassanien (Eds.), Computational Social Networks: Tools, Perspectives and Applications, Springer, London, UK, 2012, pp. 367–389.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 17766
Talking like a book. Investigating colloquialization as a change in written English
I. Mindt, in: G. Haßler, C. Neis (Eds.), Oralité(s) et Écriture(S), Nodus Publikationen, Münster, 2012, pp. 43–56.
LibreCat
 

2012 | Book Chapter | LibreCat-ID: 17856
Change in Contemporary English. A Grammatical Study
I. Mindt, G. Leech, M. Hundt, C. Mair, N. Smith, in: Archiv Für Das Studium Der Neueren Sprachen Und  Literaturen 164: 249: 2, Cambridge University Press, 2009, Cambridge, 2012, pp. 394–396.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 1884
Selfish Distributed Optimization
B. Monien, C. Scheideler, in: Euro-Par 2012 Parallel Processing - 18th International Conference, Euro-Par 2012, Rhodes Island, Greece, August 27-31, 2012. Proceedings, Springer, 2012, pp. 1--2.
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 19376
Predicting production influences on adhesively bonded joints subjected to cyclic load
D. Teutenberg, O. Hahn, Welding in the World (2012) 203–213.
LibreCat | DOI
 

Filters and Search Terms

isbn%3D978-3-030-50994-1

Search

Filter Publications

Display / Sort

Export / Embed