Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

209 Publications


2015 | Book Chapter | LibreCat-ID: 2921
Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure Signatures from Chameleon Hash Functions.” In Lecture Notes in Computer Science, 256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. https://doi.org/10.1007/978-3-662-46447-2_12.
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, Christian, Christian Mainka, Juraj Somorovsky, and Jörg Schwenk. “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.” In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Lecture Notes in Computer Science 9481. Cham, 2015. https://doi.org/10.1007/978-3-319-29883-2_5.
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 20982
Koch, Thorsten, Jörg Holtmann, and Julien DeAntoni. “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications.” In Software Architecture. Cham, 2014. https://doi.org/10.1007/978-3-319-09970-5_14.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 15092
Böttcher, Stefan, Rita Hartel, and Jonathan Rabe. “Efficient XML Keyword Search Based on DAG-Compression.” In Database and Expert Systems Applications - 25th International Conference, DEXA 2014, 122–37. Cham: Springer, 2014. https://doi.org/10.1007/978-3-319-10073-9_11.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 20008
Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-Organizing Temporary Lock-Ins.” In Ninth Int. Conf. on Swarm Intelligence (ANTS 2014). Cham, 2014. https://doi.org/10.1007/978-3-319-09952-1_15.
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 16394
Lukovszki, Tamás, and Friedhelm Meyer auf der Heide. “Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots.” In Lecture Notes in Computer Science. Cham, 2014. https://doi.org/10.1007/978-3-319-14472-6_17.
LibreCat | DOI
 

2014 | Book (Editor) | LibreCat-ID: 16870
Flocchini, Paola, Jie Gao, Evangelos Kranakis, and Friedhelm Meyer auf der Heide, eds. Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013. Vol. 8243. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2014. https://doi.org/10.1007/978-3-642-45346-5.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 6741
Bokermann, Dennis, Christian Gerth, and Gregor Engels. “Use Your Best Device! Enabling Device Changes at Runtime.” In 12th International Conference on Business Process Management (BPM 2014), 8659:357–65. Lecture Notes in Computer Science. Springer International Publishing, 2014. https://doi.org/10.1007/978-3-319-10172-9_23.
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 16395
Abshoff, Sebastian, and Friedhelm Meyer auf der Heide. “Continuous Aggregation in Dynamic Ad-Hoc Networks.” In Structural Information and Communication Complexity. Cham, 2014. https://doi.org/10.1007/978-3-319-09620-9_16.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In Constructive Side-Channel Analysis and Secure Design, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-40026-1_10.
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed