Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
2790 Publications
2016 | Newspaper Article | LibreCat-ID: 56413 |
Kokew SM. Sunniten und Schiiten: Das sind die Unterschiede. Bayernkurier. 2016.
LibreCat
| Download (ext.)
2015 | Conference Paper | LibreCat-ID: 322 |
Blömer J, Juhnke J, Kolb C. Anonymous and Publicly Linkable Reputation Systems. In: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC). LNCS. ; 2015:478--488. doi:10.1007/978-3-662-47854-7_29
LibreCat
| Files available
| DOI
| Download (ext.)
2015 | Journal Article | LibreCat-ID: 3892 |
Losquin A, Zagonel LF, Myroshnychenko V, et al. Unveiling Nanometer Scale Extinction and Scattering Phenomena through Combined Electron Energy Loss Spectroscopy and Cathodoluminescence Measurements. Nano Letters. 2015;15(2):1229-1237. doi:10.1021/nl5043775
LibreCat
| Files available
| DOI
2015 | Journal Article | LibreCat-ID: 3894 |
Hammer M, Hildebrandt A, Förstner J. How planar optical waves can be made to climb dielectric steps. Optics Letters. 2015;40(16):3711-3714. doi:10.1364/ol.40.003711
LibreCat
| Files available
| DOI
2015 | Journal Article | LibreCat-ID: 3896 |
Kou Y, Förstner J. Subwavelength binary plasmonic solitons. Optics Letters. 2015;40(6):851-854. doi:10.1364/ol.40.000851
LibreCat
| Files available
| DOI
2015 | Journal Article | LibreCat-ID: 3900 |
Mantei D, Förstner J, Gordon S, et al. Robust Population Inversion by Polarization Selective Pulsed Excitation. Scientific Reports. 2015;5(1):10313. doi:10.1038/srep10313
LibreCat
| Files available
| DOI
2015 | Book Chapter | LibreCat-ID: 2921 |
Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12
LibreCat
| DOI
| Download (ext.)
2015 | Mastersthesis | LibreCat-ID: 301 |
Bobolz J. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn; 2015.
LibreCat
| Files available
2015 | Working Paper | LibreCat-ID: 2730 |
Gries T, Grundmann R, Palnau I, Redlin M. Does Technological Change Drive Inclusive Industrialization? - A Review of Major Concepts and Findings. Vol 2015-044.; 2015.
LibreCat
| Download (ext.)
2015 | Conference Paper | LibreCat-ID: 1142 |
Geierhos M, Bäumer FS. Erfahrungsberichte aus zweiter Hand: Erkenntnisse über die Autorschaft von Arztbewertungen in Online-Portalen. In: DHd 2015: Book of Abstracts. Graz, Austria: ZIM-ACDH; 2015:69-72.
LibreCat
| Download (ext.)
2015 | Journal Article | LibreCat-ID: 1143 |
Geierhos M, Schulze S. Der zufriedene Patient 2.0: Analyse anonymer Arztbewertungen zur Generierung eines Patientenstimmungsbildes. ForschungsForum Paderborn. 2015;18:14-19.
LibreCat
| Download (ext.)
2015 | Report | LibreCat-ID: 233 |
Blömer J, Kohn K. Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn; 2015.
LibreCat
| Files available
| Download (ext.)
2015 | Conference Paper | LibreCat-ID: 5678 |
Rauchecker G, Schryen G. High-Performance Computing for Scheduling Decision Support: A Parallel Depth-First Search Heuristic. In: Australasian Conference on Information Systems. ; 2015:1-13.
LibreCat
| Files available
2015 | Journal Article | LibreCat-ID: 5679 |
Püschel T, Schryen G, Hristova D, Neumann D. Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty. European Journal of Operational Research. 2015;244(2):637-647.
LibreCat
| Files available
2015 | Preprint | LibreCat-ID: 749 |
Dräxler S, Karl H. Specification of Complex Structures in Distributed Service Function Chaining Using a YANG Data Model. CoRR. 2015.
LibreCat
| Download (ext.)
2015 | Conference Paper | LibreCat-ID: 5541 |
Yasasin E, Schryen G. Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In: 23rd European Conference on Information Systems (ECIS 2015). ; 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 5588 |
Weishäupl E, Yasasin E, Schryen G. A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In: International Conference on Information Systems. ; 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 5589 |
Weishäupl E, Yasasin E, Schryen G. IT Security Investments Through the Lens of the Resource-Based View: A new Theoretical Model and Literature Review. In: 23rd European Conference on Information Systems (ECIS 2015). ; 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 5590 |
Weishäupl E, Kunz M, Yasasin E, et al. Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15). ; 2015.
LibreCat
| Files available
2015 | Journal Article | LibreCat-ID: 5616 |
Schryen G, Weishäupl E. IT-Sicherheit: Ökonomisch Planen und Bewerten. Managementkompass. 2015;(2):17-18.
LibreCat
| Files available