Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9730 Publications


2015 | Journal Article | LibreCat-ID: 3896 | OA
Kou, Yao, and Jens Förstner. “Subwavelength Binary Plasmonic Solitons.” Optics Letters 40, no. 6 (2015): 851–54. https://doi.org/10.1364/ol.40.000851.
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 3900 | OA
Mantei, D., Jens Förstner, S. Gordon, Y. A. Leier, A. K. Rai, Dirk Reuter, A. D. Wieck, and Artur Zrenner. “Robust Population Inversion by Polarization Selective Pulsed Excitation.” Scientific Reports 5, no. 1 (2015): 10313. https://doi.org/10.1038/srep10313.
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 290
Besova, Galina, Dominik Steenken, and Heike Wehrheim. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” Computer Languages, Systems & Structures, 2015, 116–38. https://doi.org/10.1016/j.cl.2015.05.003.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 291
Börding, Paul. Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen. Universität Paderborn, 2015.
LibreCat
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure Signatures from Chameleon Hash Functions.” In Lecture Notes in Computer Science, 256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. https://doi.org/10.1007/978-3-662-46447-2_12.
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 293
Geierhos, Michaela, Frederik Simon Bäumer, Sabine Schulze, and Valentina Stuß. “Filtering Reviews by Random Individual Error.” In Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015), edited by Moonis Ali, Young Sig Kwon, Chang-Hwan Lee, Juntae Kim, and Yongdai Kim, 9101:305–15. Lecture Notes in Artificial Intelligence. Cham, Switzerland: Springer, 2015. https://doi.org/10.1007/978-3-319-19066-2_30.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 300
Neumann, Conrad. Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets. Universität Paderborn, 2015.
LibreCat
 

2015 | Dissertation | LibreCat-ID: 304
Koutsopoulos, Andreas. Dynamics and Efficiency in Topological Self-Stabilization. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Dissertation | LibreCat-ID: 305
Kniesburges, Sebastian. Distributed Data Structures and the Power of Topological Self-Stabilization. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 310
Bruns, Melanie. Design of an Evaluation Strategy for Fuzzy Service Matching. Universität Paderborn, 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 407--425, 2015. https://doi.org/10.1007/978-3-319-24174-6_21.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer, Felix, Tibor Jager, Eike Kiltz, and Sven Schäge. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 27--51, 2015. https://doi.org/10.1007/978-3-662-46447-2_2.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, Florian, Tibor Jager, and Jörg Schwenk. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 477--494, 2015. https://doi.org/10.1007/978-3-662-46447-2_21.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 121--143, 2015. https://doi.org/10.1007/978-3-662-46497-7_5.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li. “Tightly-Secure Authenticated Key Exchange.” In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 629--658, 2015. https://doi.org/10.1007/978-3-662-46494-6_26.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 313
Börding, Paul, Melanie Bruns, and Marie Christin Platenius. “Comprehensive Service Matching with MatchBox.” In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 974--977, 2015. https://doi.org/10.1145/2786805.2803181.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 315
Jungmann, Alexander, Jan Jatzkowski, and Bernd Kleinjohann. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” In Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 3162
Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture Reconfiguration.” Computer Science - R & D, no. 3–4 (2015): 303--320. https://doi.org/10.1007/s00450-014-0259-7.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 3163
Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog.” In Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, edited by Roland Meyer, Andr{\’{e}} Platzer, and Heike Wehrheim, 3--4. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-23506-6_1.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3164
Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Oleg Travkin, and Heike Wehrheim. “Verifying Opacity of a Transactional Mutex Lock.” In {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, edited by Nikolaj Bj{\o}rner and Frank S. de Boer, 161--177. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-19249-9_11.
LibreCat | DOI
 

Filters and Search Terms

isbn%3D978-3-947647-09-5

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed