Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

81 Publications


2017 | Conference Paper | LibreCat-ID: 2344
Blömer, J., Günther, P., Krummel, V., & Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In Foundations and Practice of Security (pp. 3–17). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-75650-9_1
LibreCat | Files available | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Günther, P., & Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In Mathematical Aspects of Computer and Information Sciences (pp. 151–165). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32859-1_13
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Blömer, J., Lammersen, C., Schmidt, M., & Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In Algorithm Engineering (pp. 81–116). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-49487-6_3
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2970
Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 6257
Fischer, H. G., & Senft, B. (2016). Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-44902-9_3
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 5825
Wolters, D., Kirchhoff, J., Gerth, C., & Engels, G. (2016). Cross-Device Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, & S. Bhiri (Eds.), Service-Oriented Computing (pp. 171–185). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-46295-0_11
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 15088
Böttcher, S., Hartel, R., Jacobs, T., & Jeromin, M. (2015). ECST – Extended Context-Free Straight-Line Tree Grammars. In Data Science - 30th British International Conference on Databases, BICOD 2015 (pp. 186–198). Springer. https://doi.org/10.1007/978-3-319-20424-6_18
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921
Blazy, O., Kakvi, S., Kiltz, E., & Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In Lecture Notes in Computer Science (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 15092
Böttcher, S., Hartel, R., & Rabe, J. (2014). Efficient XML Keyword Search Based on DAG-Compression. In Database and Expert Systems Applications - 25th International Conference, DEXA 2014 (pp. 122–137). Cham: Springer. https://doi.org/10.1007/978-3-319-10073-9_11
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 6741
Bokermann, D., Gerth, C., & Engels, G. (2014). Use Your Best Device! Enabling Device Changes at Runtime. In 12th International Conference on Business Process Management (BPM 2014) (Vol. 8659, pp. 357–365). Springer International Publishing. https://doi.org/10.1007/978-3-319-10172-9_23
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer, J., Günther, P., & Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In Constructive Side-Channel Analysis and Secure Design (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40026-1_10
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 6279
Fischer, H. G., Strenge, B., & Nebe, K. (2013). Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design. In Design, User Experience, and Usability. Design Philosophy, Methods, and Tools (Vol. 8012, pp. 252–261). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-39229-0_28
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 6732
Place, T., van Rooijen, L., & Zeitoun, M. (2013). Separating Regular Languages by Piecewise Testable and Unambiguous Languages. In Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013 (pp. 729–740). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40313-2_64
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 6276
Klompmaker, F., Paelke, V., & Fischer, H. G. (2013). A Taxonomy-Based Approach towards NUI Interaction Design. In Distributed, Ambient, and Pervasive Interactions (Vol. 8028, pp. 32–41). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-39351-8_4
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 15093
Böttcher, S., Hartel, R., & Jacobs, T. (2013). Fast Multi-update Operations on Compressed XML Data. In Big Data - 29th British National Conference on Databases, BNCOD 2013, (pp. 149–164). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-39467-6_15
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi, S., Kiltz, E., & May, A. (2012). Certifying RSA. In Advances in Cryptology – ASIACRYPT 2012 (pp. 404–414). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-34961-4_25
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi, S., & Kiltz, E. (2012). Optimal Security Proofs for Full Domain Hash, Revisited. In Advances in Cryptology – EUROCRYPT 2012 (pp. 537–553). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-29011-4_32
LibreCat | DOI | Download (ext.)
 

2011 | Book Chapter | LibreCat-ID: 6293
Nebe, K., Klompmaker, F., Jung, H., & Fischer, H. G. (2011). Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction. In J. A. Jacko (Ed.), Human-Computer Interaction. Interaction Techniques and Environments. (Vol. 6762, pp. 100–109). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-21605-3_11
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 15100
Böttcher, S., Hartel, R., & Stey, S. (2011). TraCX: Transformation of Compressed XML. In Advances in Databases - 28th British National Conference on Databases, BNCOD 28, Revised Selected Papers (pp. 182–193). Springer. https://doi.org/10.1007/978-3-642-24577-0_19
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 15097
Benter, M., Böttcher, S., & Hartel, R. (2011). Mixing Bottom-Up and Top-Down XPath Query Evaluation. In East European Conference on Advances in Databases and Information Systems (pp. 27–41). Springer. https://doi.org/10.1007/978-3-642-23737-9_3
LibreCat | DOI
 

2011 | Book Chapter | LibreCat-ID: 6300
Fischer, H. G., Nebe, K., & Klompmaker, F. (2011). A Holistic Model for Integrating Usability Engineering and Software Engineering Enriched with Marketing Activities. In M. Kurosu (Ed.), Human Centered Design (Vol. 6776, pp. 28–37). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-21753-1_4
LibreCat | DOI
 

2011 | Journal Article | LibreCat-ID: 3332
Lettmann, T., Baumann, M., Eberling, M., & Kemmerich, T. (2011). Modeling Agents and Agent Systems. Transactions on Computational Collective Intelligence V, 157–181. https://doi.org/10.1007/978-3-642-24016-4_9
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 15099
Bätz, A., Böttcher, S., & Hartel, R. (2011). Updates on Grammar-Compressed XML Data. In Advances in Databases - 28th British National Conference on Databases, BNCOD 28, Revised Selected Papers (pp. 154–166). Springer. https://doi.org/10.1007/978-3-642-24577-0_17
LibreCat | DOI
 

2010 | Book Chapter | LibreCat-ID: 2988
Ackermann, M. R., & Blömer, J. (2010). Bregman Clustering for Separable Instances. In SWAT 2010 (pp. 212–223). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13731-0_21
LibreCat | DOI
 

2010 | Book Chapter | LibreCat-ID: 13301
Trier, M., & Müller, C. (2010). Towards a Systematic Approach for Capturing Knowledge-Intensive Business Processes. In Practical Aspects of Knowledge Management. Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30545-3_23
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 15137
Böttcher, S., Hartel, R., & Messinger, C. (2010). Searchable Compression of Office Documents by XML Schema Subtraction. In Database and XML Technologies - 7th International XML Database Symposium, XSym 2010 (pp. 103–112). Springer. https://doi.org/10.1007/978-3-642-15684-7_9
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 2920
Kakvi, S. (2009). Reinforcement Learning for Blackjack. In Lecture Notes in Computer Science (pp. 300–301). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-04052-8_43
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 3000
Schrieb, J., Wehrheim, H., & Wonisch, D. (2009). Three-Valued Spotlight Abstractions. In FM 2009: Formal Methods (pp. 106–122). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-05089-3_8
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 9616
Kakvi, S. (2009). Reinforcement Learning for Blackjack. In Lecture Notes in Computer Science. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04052-8_43
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 1830
Biermann, T., Schwabe, A., & Karl, H. (2009). Creating Butterflies in the Core – A Network Coding Extension for MPLS/RSVP-TE. In NETWORKING 2009 (pp. 883–894). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-01399-7_69
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 15146
Böttcher, S., & Steinmetz, R. (2007). Data Management for Mobile Ajax Web 2.0 Applications. In Database and Expert Systems Applications, 18th International Conference, DEXA 2007 (pp. 424–433). Springer. https://doi.org/10.1007/978-3-540-74469-6_42
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3020
Blömer, J., & May, A. (2007). Low Secret Exponent RSA Revisited. In Lecture Notes in Computer Science (pp. 4–19). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-44670-2_2
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3019
May, A. (2007). Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. In Advances in Cryptology — CRYPTO 2002 (pp. 242–256). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45708-9_16
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3021
Blömer, J., & May, A. (2007). Key Revocation with Interval Cover Families. In Selected Areas in Cryptography (pp. 325–341). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45537-x_26
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3026
Blömer, J. (2007). A Probabilistic Zero-Test for Expressions Involving Roots of Rational Numbers. In Algorithms — ESA’ 98 (pp. 151–162). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-68530-8_13
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 15144
Böttcher, S., & Steinmetz, R. (2007). Evaluating XPath Queries on XML Data Streams. In Data Management. Data, Data Everywhere, 24th British National Conference on Databases, BNCOD 24 (pp. 101–113). Springer. https://doi.org/10.1007/978-3-540-73390-4_10
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3022
May, A., & Silverman, J. H. (2007). Dimension Reduction Methods for Convolution Modular Lattices. In Lecture Notes in Computer Science (pp. 110–125). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-44670-2_10
LibreCat | DOI
 

2006 | Book Chapter | LibreCat-ID: 3004
Blömer, J., & Krummel, V. (2006). Fault Based Collision Attacks on AES. In Lecture Notes in Computer Science (pp. 106–120). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/11889700_11
LibreCat | DOI
 

2006 | Book Chapter | LibreCat-ID: 3005
Blömer, J., & Otto, M. (2006). Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered. In Lecture Notes in Computer Science (pp. 13–23). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/11889700_2
LibreCat | DOI
 

2006 | Conference Paper | LibreCat-ID: 15150
Böttcher, S., & Steinmetz, R. (2006). DTD-Driven Structure Preserving XML Compression. In Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23 (pp. 266–269). Berlin, Heidelberg. https://doi.org/10.1007/11788911_27
LibreCat | DOI
 

2006 | Book Chapter | LibreCat-ID: 3007
Blömer, J., Otto, M., & Seifert, J.-P. (2006). Sign Change Fault Attacks on Elliptic Curve Cryptosystems. In Lecture Notes in Computer Science (pp. 36–52). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/11889700_4
LibreCat | Files available | DOI
 

2006 | Conference Paper | LibreCat-ID: 15152
Böttcher, S., & Steinmetz, R. (2006). Information Disclosure by XPath Queries. In Secure Data Management, Third VLDB Workshop, SDM 2006 (pp. 160–174). Springer. https://doi.org/10.1007/11844662_12
LibreCat | DOI
 

2005 | Book Chapter | LibreCat-ID: 3006
Blömer, J., & May, A. (2005). A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. In EUROCRYPT 2005 (pp. 251–267). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/11426639_15
LibreCat | Files available | DOI
 

2005 | Conference Paper | LibreCat-ID: 15156
Böttcher, S., & Steinmetz, R. (2005). Detecting Privacy Violations in Sensitive XML Databases. In Secure Data Management, Second VLDB Workshop, SDM 2005 (pp. 143–154). Springer. https://doi.org/10.1007/11552338_10
LibreCat | DOI
 

2005 | Book Chapter | LibreCat-ID: 3010
Ernst, M., Jochemsz, E., May, A., & de Weger, B. (2005). Partial Key Exposure Attacks on RSA up to Full Size Exponents. In EUROCRYPT 2005 (pp. 371–386). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/11426639_22
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3011
Blömer, J., Guajardo, J., & Krummel, V. (2004). Provably Secure Masking of AES. In Selected Areas in Cryptography (pp. 69–83). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-30564-4_5
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3012
Blömer, J., & May, A. (2004). A Generalized Wiener Attack on RSA. In Public Key Cryptography – PKC 2004 (pp. 1–13). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-24632-9_1
LibreCat | Files available | DOI
 

2004 | Book Chapter | LibreCat-ID: 3014
May, A. (2004). Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q. In Public Key Cryptography – PKC 2004 (pp. 218–230). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-24632-9_16
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3015
May, A. (2004). Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. In Advances in Cryptology – CRYPTO 2004 (pp. 213–219). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-28628-8_13
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 13618
Walder, H., & Platzner, M. (2004). A Runtime Environment for Reconfigurable Hardware Operating Systems. In Proceedings of the 14th International Conference on Field Programmable Logic and Applications (FPL) (pp. 831–835). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-540-30117-2_84
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 3016
Blömer, J., & May, A. (2003). New Partial Key Exposure Attacks on RSA. In Advances in Cryptology - CRYPTO 2003 (pp. 27–43). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-45146-4_2
LibreCat | DOI
 

2003 | Conference Paper | LibreCat-ID: 13615
Steiger, C., Walder, H., & Platzner, M. (2003). Heuristics for Online Scheduling Real-Time Tasks to Partially Reconfigurable Devices. In Proceedings of the 13th International Conference on Field Programmable Logic and Applications (FPL) (pp. 575–584). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-540-45234-8_56
LibreCat | DOI
 

2003 | Conference Paper | LibreCat-ID: 15077
Böttcher, S., & Steinmetz, R. (2003). Testing Containment of XPath Expressions in Order to Reduce the Data Transfer to Mobile Clients. In Advances in Databases and Information Systems, 7th East European Conference, ADBIS 2003 (pp. 400–410). Springer. https://doi.org/10.1007/978-3-540-39403-7_30
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 3018
Blömer, J., & Seifert, J.-P. (2003). Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In Financial Cryptography (pp. 162–181). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-45126-6_12
LibreCat | DOI
 

2003 | Conference Paper | LibreCat-ID: 15078
Böttcher, S., & Steinmetz, R. (2003). A DTD Graph Based XPath Query Subsumption Test. In Database and XML Technologies, First International XML Database Symposium, XSym 2003 (pp. 85–99). Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39429-7_6
LibreCat | DOI
 

2000 | Book Chapter | LibreCat-ID: 3023
Blömer, J. (2000). Closest Vectors, Successive Minima, and Dual HKZ-Bases of Lattices. In Automata, Languages and Programming (pp. 248–259). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45022-x_22
LibreCat | DOI
 

1999 | Conference Paper | LibreCat-ID: 13608
Eisenring, M., Platzner, M., & Thiele, L. (1999). Communication Synthesis for Reconfigurable Embedded Systems. In Proceedings of the 9th International Workshop on Field Programmable Logic and Applications (FPL) (Vol. 1673, pp. 205–214). Springer. https://doi.org/10.1007/978-3-540-48302-1_21
LibreCat | DOI
 

1999 | Book Chapter | LibreCat-ID: 2435
Simon, J., Reinefeld, A., & Heinz, O. (1999). Large-Scale SCI Clusters in Practice: Architecture and Performance in SCI. In H. Hellwagner & A. Reinefeld (Eds.), SCI: Scalable Coherent Interface. Architecture and Software for High-Performance Compute Clusters (Vol. 1734, pp. 367–381). Berlin / Heidelberg: Springer. https://doi.org/10.1007/10704208
LibreCat | DOI
 

1998 | Conference Paper | LibreCat-ID: 13606
Platzner, M., & De Micheli, G. (1998). Acceleration of satisfiability algorithms by reconfigurable hardware. In Proceedings of the 8th International Workshop on Field Programmable Logic and Applications (FPL) (pp. 69–78). Berlin, Heidelberg: Springer . https://doi.org/10.1007/bfb0055234
LibreCat | DOI
 

1997 | Book Chapter | LibreCat-ID: 3029
Blömer, J. (1997). Denesting by bounded degree radicals. In Algorithms — ESA ’97 (pp. 53–63). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-63397-9_5
LibreCat | Files available | DOI
 

1992 | Book Chapter | LibreCat-ID: 3046
Alt, H., & Blömer, J. (1992). Resemblance and symmetries of geometric patterns. In Data structures and efficient algorithms (pp. 1–24). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-55488-2_19
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed