Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
300 Publications
2017 | Conference Paper | LibreCat-ID: 2344 |
J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in Foundations and Practice of Security, 2017, pp. 3–17.
LibreCat
| Files available
| DOI
2017 | Book Chapter | LibreCat-ID: 2381
S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems,” in Lecture Notes in Computer Science, vol. 10236, D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International Publishing, 2017, pp. 116–127.
LibreCat
| DOI
2017 | Conference Paper | LibreCat-ID: 5769
M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow Analyses,” in Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017), 2017, pp. 362–378.
LibreCat
| Files available
| DOI
2017 | Book Chapter | LibreCat-ID: 6255
H. G. Fischer, M. Engler, and S. Sauer, “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0,” in Design, User Experience, and Usability: Theory, Methodology, and Management, vol. 10288, Cham: Springer International Publishing, 2017, pp. 570–583.
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 6257
H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows,” in Human-Centered and Error-Resilient Systems Development, vol. 9856, C. Bogdan, Ed. Cham: Springer International Publishing, 2016, pp. 30–41.
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 60904
A. Yegenoglu, P. Quaglio, E. Torre, S. Grün, and D. Endres, “Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains,” in Lecture Notes in Computer Science, Cham: Springer International Publishing, 2016.
LibreCat
| DOI
2015 | Book Chapter | LibreCat-ID: 2921 |
O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from Chameleon Hash Functions,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.
LibreCat
| DOI
| Download (ext.)
2015 | Book Chapter | LibreCat-ID: 15897
C. Altmeier, C. Mainka, J. Somorovsky, and J. Schwenk, “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services,” in Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Cham, 2015.
LibreCat
| DOI
2015 | Book Chapter | LibreCat-ID: 15899
T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in Computer Security -- ESORICS 2015, Cham, 2015.
LibreCat
| DOI
| Download (ext.)