Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
308 Publications
2007 | Conference Paper | LibreCat-ID: 15146
Böttcher, Stefan, and Rita Steinmetz. “Data Management for Mobile Ajax Web 2.0 Applications.” In Database and Expert Systems Applications, 18th International Conference, DEXA 2007, 424–33. Springer, 2007. https://doi.org/10.1007/978-3-540-74469-6_42.
LibreCat
| DOI
2006 | Conference Paper | LibreCat-ID: 19838
Rührup, Stefan, and Christian Schindelhauer. “Online Multi-Path Routing in a Maze.” In Proc. of the 17th International Symposium on Algorithms and Computation (ISAAC 2006), 2006. https://doi.org/10.1007/11940128_65.
LibreCat
| DOI
2006 | Conference Paper | LibreCat-ID: 24277
Kutyłowski, Jarosław, and Filip Zagórski. “Reliable Broadcasting Without Collision Detection.” In SOFSEM 2006: Theory and Practice of Computer Science. Berlin, Heidelberg, 2006. https://doi.org/10.1007/11611257_37.
LibreCat
| DOI
2006 | Book Chapter | LibreCat-ID: 3004
Blömer, Johannes, and Volker Krummel. “Fault Based Collision Attacks on AES.” In Lecture Notes in Computer Science, 106–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. https://doi.org/10.1007/11889700_11.
LibreCat
| DOI
2006 | Book Chapter | LibreCat-ID: 3005
Blömer, Johannes, and Martin Otto. “Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered.” In Lecture Notes in Computer Science, 13–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. https://doi.org/10.1007/11889700_2.
LibreCat
| DOI
2006 | Book Chapter | LibreCat-ID: 3007
Blömer, Johannes, Martin Otto, and Jean-Pierre Seifert. “Sign Change Fault Attacks on Elliptic Curve Cryptosystems.” In Lecture Notes in Computer Science, 36–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. https://doi.org/10.1007/11889700_4.
LibreCat
| Files available
| DOI
2006 | Conference Paper | LibreCat-ID: 18926
Dynia, Miroslaw, Miroslaw Korzeniowski, and Christian Schindelhauer. “Power-Aware Collective Tree Exploration.” In Architecture of Computing Systems - ARCS, 341--351, 2006. https://doi.org/10.1007/11682127_24.
LibreCat
| DOI
2006 | Book Chapter | LibreCat-ID: 17987
Meer, Klaus, and Martin Ziegler. “Uncomputability Below the Real Halting Problem.” In Logical Approaches to Computational Barriers. Berlin, Heidelberg, 2006. https://doi.org/10.1007/11780342_39.
LibreCat
| DOI
2006 | Book Chapter | LibreCat-ID: 16472
Demaine, Erik D., Friedhelm Meyer auf der Heide, Rasmus Pagh, and Mihai Pǎtraşcu. “De Dictionariis Dynamicis Pauco Spatio Utentibus ({lat.} On Dynamic Dictionaries Using Little Space).” In LATIN 2006: Theoretical Informatics. Berlin, Heidelberg, 2006. https://doi.org/10.1007/11682462_34.
LibreCat
| DOI
2006 | Book Chapter | LibreCat-ID: 16473
Dynia, M., J. Kutyłowski, Friedhelm Meyer auf der Heide, and Christian Schindelhauer. “Smart Robot Teams Exploring Sparse Trees.” In Lecture Notes in Computer Science. Berlin, Heidelberg, 2006. https://doi.org/10.1007/11821069_29.
LibreCat
| DOI
2006 | Conference Paper | LibreCat-ID: 15150
Böttcher, Stefan, and Rita Steinmetz. “DTD-Driven Structure Preserving XML Compression.” In Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23, 266–69. Berlin, Heidelberg, 2006. https://doi.org/10.1007/11788911_27.
LibreCat
| DOI
2006 | Conference Paper | LibreCat-ID: 15152
Böttcher, Stefan, and Rita Steinmetz. “Information Disclosure by XPath Queries.” In Secure Data Management, Third VLDB Workshop, SDM 2006, 160–74. Springer, 2006. https://doi.org/10.1007/11844662_12.
LibreCat
| DOI
2006 | Book Chapter | LibreCat-ID: 53181
Geiselmann, Willi, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, and Rainer Steinwandt. “A Simpler Sieving Device: Combining ECM and TWIRL.” In Information Security and Cryptology – ICISC 2006. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. https://doi.org/10.1007/11927587_12.
LibreCat
| DOI
2006 | Book Chapter | LibreCat-ID: 35958
Fouvry, Étienne, and Jürgen Klüners. “Cohen–Lenstra Heuristics of Quadratic Number Fields.” In Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. https://doi.org/10.1007/11792086_4.
LibreCat
| Files available
| DOI
2005 | Conference Paper | LibreCat-ID: 19835
Rührup, Stefan, Christian Schindelhauer, and Klaus Volbert. “Performance Analysis of the Hierarchical Layer Graph for Wireless Networks.” In Proc. of 4th International Conference on Ad-Hoc, Mobile & Wireless Networks (ADHOC-NOW 2005), 3738:244–57, 2005. https://doi.org/10.1007/11561354_21.
LibreCat
| DOI
2005 | Book Chapter | LibreCat-ID: 19836
Schindelhauer, Christian, and Kerstin Voß. “Probability Distributions for Channel Utilisation.” In Proc. of 4th International Conference on Ad-Hoc Networks & Wireless (ADHOC-NOW 2005), 271–84. 3738, 2005. https://doi.org/10.1007/11561354_23.
LibreCat
| DOI
2005 | Conference Paper | LibreCat-ID: 19912
Loeser, Chris, Gunnar Schomaker, André Brinkmann, Mario Vodisek, and Michael Heidebuer. “Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts.” In Proceedings of the 4th International Conference on Networking, 3421:800–810. Berlin, Heidelberg, 2005. https://doi.org/10.1007/978-3-540-31957-3_90.
LibreCat
| DOI
2005 | Book Chapter | LibreCat-ID: 3006
Blömer, Johannes, and Alexander May. “A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers.” In EUROCRYPT 2005, 251–67. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. https://doi.org/10.1007/11426639_15.
LibreCat
| Files available
| DOI
2005 | Book Chapter | LibreCat-ID: 3010
Ernst, Matthias, Ellen Jochemsz, Alexander May, and Benne de Weger. “Partial Key Exposure Attacks on RSA up to Full Size Exponents.” In EUROCRYPT 2005, 371–86. LNCS. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. https://doi.org/10.1007/11426639_22.
LibreCat
| DOI
2005 | Book Chapter | LibreCat-ID: 26991
Rührup, Stefan, and Christian Schindelhauer. “Online Routing in Faulty Meshes with Sub-Linear Comparative Time and Traffic Ratio.” In Algorithms – ESA 2005. Berlin, Heidelberg, 2005. https://doi.org/10.1007/11561071_5.
LibreCat
| DOI