Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
264 Publications
2017 | Book Chapter | LibreCat-ID: 6255
H. G. Fischer, M. Engler, and S. Sauer, “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0,” in Design, User Experience, and Usability: Theory, Methodology, and Management, vol. 10288, Cham: Springer International Publishing, 2017, pp. 570–583.
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 6257
H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows,” in Human-Centered and Error-Resilient Systems Development, vol. 9856, C. Bogdan, Ed. Cham: Springer International Publishing, 2016, pp. 30–41.
LibreCat
| DOI
2015 | Book Chapter | LibreCat-ID: 2921 |
O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from Chameleon Hash Functions,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.
LibreCat
| DOI
| Download (ext.)
2015 | Book Chapter | LibreCat-ID: 15897
C. Altmeier, C. Mainka, J. Somorovsky, and J. Schwenk, “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services,” in Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Cham, 2015.
LibreCat
| DOI
2015 | Book Chapter | LibreCat-ID: 15899
T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in Computer Security -- ESORICS 2015, Cham, 2015.
LibreCat
| DOI
| Download (ext.)
2014 | Book (Editor) | LibreCat-ID: 16870
P. Flocchini, J. Gao, E. Kranakis, and F. Meyer auf der Heide, Eds., Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, vol. 8243. Berlin, Heidelberg: Springer, 2014.
LibreCat
| DOI
2013 | Book Chapter | LibreCat-ID: 6279
H. G. Fischer, B. Strenge, and K. Nebe, “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design,” in Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, vol. 8012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 252–261.
LibreCat
| DOI
2013 | Conference Paper | LibreCat-ID: 6732
T. Place, L. van Rooijen, and M. Zeitoun, “Separating Regular Languages by Piecewise Testable and Unambiguous Languages,” in Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013, 2013, pp. 729–740.
LibreCat
| DOI
2012 | Book Chapter | LibreCat-ID: 2919
S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,” in Advances in Cryptology – EUROCRYPT 2012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 537–553.
LibreCat
| DOI
| Download (ext.)
2012 | Conference Paper | LibreCat-ID: 16408
T. Suess, C. Koch, C. Jähn, M. Fischer, and F. Meyer auf der Heide, “Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes,” in Advances in Visual Computing, 2012, vol. 7431, pp. 502–512, doi: 10.1007/978-3-642-33179-4_48.
LibreCat
| DOI
2011 | Book Chapter | LibreCat-ID: 6293
K. Nebe, F. Klompmaker, H. Jung, and H. G. Fischer, “Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction,” in Human-Computer Interaction. Interaction Techniques and Environments., vol. 6762, J. A. Jacko, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 100–109.
LibreCat
| DOI
2011 | Book Chapter | LibreCat-ID: 6300
H. G. Fischer, K. Nebe, and F. Klompmaker, “A Holistic Model for Integrating Usability Engineering and Software Engineering Enriched with Marketing Activities,” in Human Centered Design, vol. 6776, M. Kurosu, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 28–37.
LibreCat
| DOI
2010 | Conference Paper | LibreCat-ID: 19796
M. Mense and C. Schindelhauer, “Read-Write-Codes: An Erasure Resilient Encoding System for Flexible Reading and Writing in Storage Networks,” in Proceedings of 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2010, vol. 5873, pp. 624--639.
LibreCat
| DOI
2010 | Journal Article | LibreCat-ID: 24282
R. Grza̧ślewicz, J. Kutyłowski, M. Kutyłowski, and W. Pietkiewicz, “Robust Undetectable Interference Watermarks,” ICCSA’05: Proceedings of the 2005 international conference on Computational Science and Its Applications, 2010, doi: 10.1007/11424826_55.
LibreCat
| DOI
2010 | Book (Editor) | LibreCat-ID: 16403
S. Abramsky, C. Gavoille, C. Kirchner, F. Meyer auf der Heide, and P. G. Spirakis, Eds., Automata, Languages and Programming, 37th International Colloquium, ICALP 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part II. Berlin, Heidelberg, 2010.
LibreCat
| DOI
2010 | Book (Editor) | LibreCat-ID: 16404
S. Abramsky, C. Gavoille, C. Kirchner, F. Meyer auf der Heide, and P. G. Spirakis, Eds., Automata, Languages and Programming, 37th International Colloquium, ICALP 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part I. Berlin, Heidelberg, 2010.
LibreCat
| DOI
2007 | Conference Paper | LibreCat-ID: 24276
M. Bienkowski and J. Kutyłowski, “The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces,” 2007, doi: 10.1007/978-3-540-73951-7_30.
LibreCat
| DOI
2007 | Conference Paper | LibreCat-ID: 18929
M. Dynia, M. Korzeniowski, and J. Kutyłowski, “Competitive Maintenance of Minimum Spanning Trees in Dynamic Graphs,” in Proc. of the 33rd International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM’07), 2007, vol. 4362, pp. 260--271.
LibreCat
| DOI
2006 | Conference Paper | LibreCat-ID: 24277
J. Kutyłowski and F. Zagórski, “Reliable Broadcasting Without Collision Detection,” 2006, doi: 10.1007/11611257_37.
LibreCat
| DOI
2006 | Book Chapter | LibreCat-ID: 3007
J. Blömer, M. Otto, and J.-P. Seifert, “Sign Change Fault Attacks on Elliptic Curve Cryptosystems,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 36–52.
LibreCat
| Files available
| DOI
2006 | Book Chapter | LibreCat-ID: 35958
É. Fouvry and J. Klüners, “Cohen–Lenstra Heuristics of Quadratic Number Fields,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2006.
LibreCat
| Files available
| DOI