Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

146 Publications


2015 | Conference Paper | LibreCat-ID: 15088
Böttcher, Stefan, Rita Hartel, Thomas Jacobs, and Markus Jeromin. “ECST – Extended Context-Free Straight-Line Tree Grammars.” In Data Science - 30th British International Conference on Databases, BICOD 2015, 186–98. Springer, 2015. https://doi.org/10.1007/978-3-319-20424-6_18.
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 15899
Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In Computer Security -- ESORICS 2015. Cham, 2015. https://doi.org/10.1007/978-3-319-24174-6_21.
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 2921
Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure Signatures from Chameleon Hash Functions.” In Lecture Notes in Computer Science, 256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. https://doi.org/10.1007/978-3-662-46447-2_12.
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, Christian, Christian Mainka, Juraj Somorovsky, and Jörg Schwenk. “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.” In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Lecture Notes in Computer Science 9481. Cham, 2015. https://doi.org/10.1007/978-3-319-29883-2_5.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 15092
Böttcher, Stefan, Rita Hartel, and Jonathan Rabe. “Efficient XML Keyword Search Based on DAG-Compression.” In Database and Expert Systems Applications - 25th International Conference, DEXA 2014, 122–37. Cham: Springer, 2014. https://doi.org/10.1007/978-3-319-10073-9_11.
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 16394
Lukovszki, Tamás, and Friedhelm Meyer auf der Heide. “Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots.” In Lecture Notes in Computer Science. Cham, 2014. https://doi.org/10.1007/978-3-319-14472-6_17.
LibreCat | DOI
 

2014 | Book (Editor) | LibreCat-ID: 16870
Flocchini, Paola, Jie Gao, Evangelos Kranakis, and Friedhelm Meyer auf der Heide, eds. Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013. Vol. 8243. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2014. https://doi.org/10.1007/978-3-642-45346-5.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 6741
Bokermann, Dennis, Christian Gerth, and Gregor Engels. “Use Your Best Device! Enabling Device Changes at Runtime.” In 12th International Conference on Business Process Management (BPM 2014), 8659:357–65. Lecture Notes in Computer Science. Springer International Publishing, 2014. https://doi.org/10.1007/978-3-319-10172-9_23.
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 16395
Abshoff, Sebastian, and Friedhelm Meyer auf der Heide. “Continuous Aggregation in Dynamic Ad-Hoc Networks.” In Structural Information and Communication Complexity. Cham, 2014. https://doi.org/10.1007/978-3-319-09620-9_16.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In Constructive Side-Channel Analysis and Secure Design, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-40026-1_10.
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed