Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

81 Publications


2017 | Conference Paper | LibreCat-ID: 2344
Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: Foundations and Practice of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1
LibreCat | Files available | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: Mathematical Aspects of Computer and Information Sciences. Cham: Springer International Publishing; 2016:151-165. doi:10.1007/978-3-319-32859-1_13
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: Algorithm Engineering. Cham: Springer International Publishing; 2016:81-116. doi:10.1007/978-3-319-49487-6_3
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2970
Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances in Knowledge Discovery and Data Mining. Cham: Springer International Publishing; 2016:296-308. doi:10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 6257
Fischer HG, Senft B. Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In: Bogdan C, ed. Human-Centered and Error-Resilient Systems Development. Vol 9856. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2016:30-41. doi:10.1007/978-3-319-44902-9_3
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 5825
Wolters D, Kirchhoff J, Gerth C, Engels G. Cross-Device Integration of Android Apps. In: Sheng QZ, Stroulia E, Tata S, Bhiri S, eds. Service-Oriented Computing. Cham: Springer International Publishing; 2016:171-185. doi:10.1007/978-3-319-46295-0_11
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 15088
Böttcher S, Hartel R, Jacobs T, Jeromin M. ECST – Extended Context-Free Straight-Line Tree Grammars. In: Data Science - 30th British International Conference on Databases, BICOD 2015. Springer; 2015:186-198. doi:10.1007/978-3-319-20424-6_18
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921
Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 15092
Böttcher S, Hartel R, Rabe J. Efficient XML Keyword Search Based on DAG-Compression. In: Database and Expert Systems Applications - 25th International Conference, DEXA 2014. Cham: Springer; 2014:122-137. doi:10.1007/978-3-319-10073-9_11
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 6741
Bokermann D, Gerth C, Engels G. Use Your Best Device! Enabling Device Changes at Runtime. In: 12th International Conference on Business Process Management (BPM 2014). Vol 8659. Lecture Notes in Computer Science. Springer International Publishing; 2014:357-365. doi:10.1007/978-3-319-10172-9_23
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: Constructive Side-Channel Analysis and Secure Design. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:10.1007/978-3-642-40026-1_10
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 6279
Fischer HG, Strenge B, Nebe K. Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design. In: Design, User Experience, and Usability. Design Philosophy, Methods, and Tools. Vol 8012. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:252-261. doi:10.1007/978-3-642-39229-0_28
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 6732
Place T, van Rooijen L, Zeitoun M. Separating Regular Languages by Piecewise Testable and Unambiguous Languages. In: Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:729-740. doi:10.1007/978-3-642-40313-2_64
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 6276
Klompmaker F, Paelke V, Fischer HG. A Taxonomy-Based Approach towards NUI Interaction Design. In: Distributed, Ambient, and Pervasive Interactions. Vol 8028. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:32-41. doi:10.1007/978-3-642-39351-8_4
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 15093
Böttcher S, Hartel R, Jacobs T. Fast Multi-update Operations on Compressed XML Data. In: Big Data - 29th British National Conference on Databases, BNCOD 2013,. Berlin, Heidelberg: Springer; 2013:149-164. doi:10.1007/978-3-642-39467-6_15
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi S, Kiltz E, May A. Certifying RSA. In: Advances in Cryptology – ASIACRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:10.1007/978-3-642-34961-4_25
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. In: Advances in Cryptology – EUROCRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:537-553. doi:10.1007/978-3-642-29011-4_32
LibreCat | DOI | Download (ext.)
 

2011 | Book Chapter | LibreCat-ID: 6293
Nebe K, Klompmaker F, Jung H, Fischer HG. Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction. In: Jacko JA, ed. Human-Computer Interaction. Interaction Techniques and Environments. Vol 6762. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011:100-109. doi:10.1007/978-3-642-21605-3_11
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 15100
Böttcher S, Hartel R, Stey S. TraCX: Transformation of Compressed XML. In: Advances in Databases - 28th British National Conference on Databases, BNCOD 28, Revised Selected Papers. Springer; 2011:182-193. doi:10.1007/978-3-642-24577-0_19
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 15097
Benter M, Böttcher S, Hartel R. Mixing Bottom-Up and Top-Down XPath Query Evaluation. In: East European Conference on Advances in Databases and Information Systems. Springer; 2011:27-41. doi:10.1007/978-3-642-23737-9_3
LibreCat | DOI
 

2011 | Book Chapter | LibreCat-ID: 6300
Fischer HG, Nebe K, Klompmaker F. A Holistic Model for Integrating Usability Engineering and Software Engineering Enriched with Marketing Activities. In: Kurosu M, ed. Human Centered Design. Vol 6776. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011:28-37. doi:10.1007/978-3-642-21753-1_4
LibreCat | DOI
 

2011 | Journal Article | LibreCat-ID: 3332
Lettmann T, Baumann M, Eberling M, Kemmerich T. Modeling Agents and Agent Systems. Transactions on Computational Collective Intelligence V. 2011:157-181. doi:10.1007/978-3-642-24016-4_9
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 15099
Bätz A, Böttcher S, Hartel R. Updates on Grammar-Compressed XML Data. In: Advances in Databases - 28th British National Conference on Databases, BNCOD 28, Revised Selected Papers. Springer; 2011:154-166. doi:10.1007/978-3-642-24577-0_17
LibreCat | DOI
 

2010 | Book Chapter | LibreCat-ID: 2988
Ackermann MR, Blömer J. Bregman Clustering for Separable Instances. In: SWAT 2010. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2010:212-223. doi:10.1007/978-3-642-13731-0_21
LibreCat | DOI
 

2010 | Book Chapter | LibreCat-ID: 13301
Trier M, Müller C. Towards a Systematic Approach for Capturing Knowledge-Intensive Business Processes. In: Practical Aspects of Knowledge Management. Berlin, Heidelberg; 2010. doi:10.1007/978-3-540-30545-3_23
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 15137
Böttcher S, Hartel R, Messinger C. Searchable Compression of Office Documents by XML Schema Subtraction. In: Database and XML Technologies - 7th International XML Database Symposium, XSym 2010. Springer; 2010:103-112. doi:10.1007/978-3-642-15684-7_9
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 2920
Kakvi S. Reinforcement Learning for Blackjack. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2009:300-301. doi:10.1007/978-3-642-04052-8_43
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 3000
Schrieb J, Wehrheim H, Wonisch D. Three-Valued Spotlight Abstractions. In: FM 2009: Formal Methods. Berlin, Heidelberg: Springer Berlin Heidelberg; 2009:106-122. doi:10.1007/978-3-642-05089-3_8
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 9616
Kakvi S. Reinforcement Learning for Blackjack. In: Lecture Notes in Computer Science. Berlin, Heidelberg; 2009. doi:10.1007/978-3-642-04052-8_43
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 1830
Biermann T, Schwabe A, Karl H. Creating Butterflies in the Core – A Network Coding Extension for MPLS/RSVP-TE. In: NETWORKING 2009. Berlin, Heidelberg: Springer Berlin Heidelberg; 2009:883-894. doi:10.1007/978-3-642-01399-7_69
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 15146
Böttcher S, Steinmetz R. Data Management for Mobile Ajax Web 2.0 Applications. In: Database and Expert Systems Applications, 18th International Conference, DEXA 2007. Springer; 2007:424-433. doi:10.1007/978-3-540-74469-6_42
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3020
Blömer J, May A. Low Secret Exponent RSA Revisited. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:4-19. doi:10.1007/3-540-44670-2_2
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3019
May A. Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. In: Advances in Cryptology — CRYPTO 2002. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:242-256. doi:10.1007/3-540-45708-9_16
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3021
Blömer J, May A. Key Revocation with Interval Cover Families. In: Selected Areas in Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:325-341. doi:10.1007/3-540-45537-x_26
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3026
Blömer J. A Probabilistic Zero-Test for Expressions Involving Roots of Rational Numbers. In: Algorithms — ESA’ 98. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:151-162. doi:10.1007/3-540-68530-8_13
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 15144
Böttcher S, Steinmetz R. Evaluating XPath Queries on XML Data Streams. In: Data Management. Data, Data Everywhere, 24th British National Conference on Databases, BNCOD 24. Springer; 2007:101-113. doi:10.1007/978-3-540-73390-4_10
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3022
May A, Silverman JH. Dimension Reduction Methods for Convolution Modular Lattices. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:110-125. doi:10.1007/3-540-44670-2_10
LibreCat | DOI
 

2006 | Book Chapter | LibreCat-ID: 3004
Blömer J, Krummel V. Fault Based Collision Attacks on AES. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2006:106-120. doi:10.1007/11889700_11
LibreCat | DOI
 

2006 | Book Chapter | LibreCat-ID: 3005
Blömer J, Otto M. Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2006:13-23. doi:10.1007/11889700_2
LibreCat | DOI
 

2006 | Conference Paper | LibreCat-ID: 15150
Böttcher S, Steinmetz R. DTD-Driven Structure Preserving XML Compression. In: Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23. Berlin, Heidelberg; 2006:266-269. doi:10.1007/11788911_27
LibreCat | DOI
 

2006 | Book Chapter | LibreCat-ID: 3007
Blömer J, Otto M, Seifert J-P. Sign Change Fault Attacks on Elliptic Curve Cryptosystems. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2006:36-52. doi:10.1007/11889700_4
LibreCat | Files available | DOI
 

2006 | Conference Paper | LibreCat-ID: 15152
Böttcher S, Steinmetz R. Information Disclosure by XPath Queries. In: Secure Data Management, Third VLDB Workshop, SDM 2006. Springer; 2006:160-174. doi:10.1007/11844662_12
LibreCat | DOI
 

2005 | Book Chapter | LibreCat-ID: 3006
Blömer J, May A. A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. In: EUROCRYPT 2005. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:251-267. doi:10.1007/11426639_15
LibreCat | Files available | DOI
 

2005 | Conference Paper | LibreCat-ID: 15156
Böttcher S, Steinmetz R. Detecting Privacy Violations in Sensitive XML Databases. In: Secure Data Management, Second VLDB Workshop, SDM 2005. Springer; 2005:143-154. doi:10.1007/11552338_10
LibreCat | DOI
 

2005 | Book Chapter | LibreCat-ID: 3010
Ernst M, Jochemsz E, May A, de Weger B. Partial Key Exposure Attacks on RSA up to Full Size Exponents. In: EUROCRYPT 2005. LNCS. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:371-386. doi:10.1007/11426639_22
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3011
Blömer J, Guajardo J, Krummel V. Provably Secure Masking of AES. In: Selected Areas in Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:69-83. doi:10.1007/978-3-540-30564-4_5
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3012
Blömer J, May A. A Generalized Wiener Attack on RSA. In: Public Key Cryptography – PKC 2004. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:1-13. doi:10.1007/978-3-540-24632-9_1
LibreCat | Files available | DOI
 

2004 | Book Chapter | LibreCat-ID: 3014
May A. Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q. In: Public Key Cryptography – PKC 2004. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:218-230. doi:10.1007/978-3-540-24632-9_16
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3015
May A. Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. In: Advances in Cryptology – CRYPTO 2004. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:213-219. doi:10.1007/978-3-540-28628-8_13
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 13618
Walder H, Platzner M. A Runtime Environment for Reconfigurable Hardware Operating Systems. In: Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL). Berlin, Heidelberg: Springer; 2004:831-835. doi:10.1007/978-3-540-30117-2_84
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 3016
Blömer J, May A. New Partial Key Exposure Attacks on RSA. In: Advances in Cryptology - CRYPTO 2003. Berlin, Heidelberg: Springer Berlin Heidelberg; 2003:27-43. doi:10.1007/978-3-540-45146-4_2
LibreCat | DOI
 

2003 | Conference Paper | LibreCat-ID: 13615
Steiger C, Walder H, Platzner M. Heuristics for Online Scheduling Real-Time Tasks to Partially Reconfigurable Devices. In: Proceedings of the 13th International Conference on Field Programmable Logic and Applications (FPL). Berlin, Heidelberg: Springer; 2003:575-584. doi:10.1007/978-3-540-45234-8_56
LibreCat | DOI
 

2003 | Conference Paper | LibreCat-ID: 15077
Böttcher S, Steinmetz R. Testing Containment of XPath Expressions in Order to Reduce the Data Transfer to Mobile Clients. In: Advances in Databases and Information Systems, 7th East European Conference, ADBIS 2003. Springer; 2003:400-410. doi:10.1007/978-3-540-39403-7_30
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 3018
Blömer J, Seifert J-P. Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In: Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg; 2003:162-181. doi:10.1007/978-3-540-45126-6_12
LibreCat | DOI
 

2003 | Conference Paper | LibreCat-ID: 15078
Böttcher S, Steinmetz R. A DTD Graph Based XPath Query Subsumption Test. In: Database and XML Technologies, First International XML Database Symposium, XSym 2003. Berlin, Heidelberg; 2003:85-99. doi:10.1007/978-3-540-39429-7_6
LibreCat | DOI
 

2000 | Book Chapter | LibreCat-ID: 3023
Blömer J. Closest Vectors, Successive Minima, and Dual HKZ-Bases of Lattices. In: Automata, Languages and Programming. Berlin, Heidelberg: Springer Berlin Heidelberg; 2000:248-259. doi:10.1007/3-540-45022-x_22
LibreCat | DOI
 

1999 | Conference Paper | LibreCat-ID: 13608
Eisenring M, Platzner M, Thiele L. Communication Synthesis for Reconfigurable Embedded Systems. In: Proceedings of the 9th International Workshop on Field Programmable Logic and Applications (FPL). Vol 1673. LCS. Springer; 1999:205-214. doi:10.1007/978-3-540-48302-1_21
LibreCat | DOI
 

1999 | Book Chapter | LibreCat-ID: 2435
Simon J, Reinefeld A, Heinz O. Large-Scale SCI Clusters in Practice: Architecture and Performance in SCI. In: Hellwagner H, Reinefeld A, eds. SCI: Scalable Coherent Interface. Architecture and Software for High-Performance Compute Clusters. Vol 1734. Lecture Notes in Computer Science (LNCS). Berlin / Heidelberg: Springer; 1999:367-381. doi:10.1007/10704208
LibreCat | DOI
 

1998 | Conference Paper | LibreCat-ID: 13606
Platzner M, De Micheli G. Acceleration of satisfiability algorithms by reconfigurable hardware. In: Proceedings of the 8th International Workshop on Field Programmable Logic and Applications (FPL) . LNCS. Berlin, Heidelberg: Springer ; 1998:69-78. doi:10.1007/bfb0055234
LibreCat | DOI
 

1997 | Book Chapter | LibreCat-ID: 3029
Blömer J. Denesting by bounded degree radicals. In: Algorithms — ESA ’97. Berlin, Heidelberg: Springer Berlin Heidelberg; 1997:53-63. doi:10.1007/3-540-63397-9_5
LibreCat | Files available | DOI
 

1992 | Book Chapter | LibreCat-ID: 3046
Alt H, Blömer J. Resemblance and symmetries of geometric patterns. In: Data Structures and Efficient Algorithms. Berlin, Heidelberg: Springer Berlin Heidelberg; 1992:1-24. doi:10.1007/3-540-55488-2_19
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed