Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

1561 Publications


2012 | Conference Paper | LibreCat-ID: 2982
Ackermann, M. R., Märtens, M., Raupach, C., Swierkot, K., Lammersen, C., & Sohler, C. (2012). StreamKM++: A clustering algorithm for data streams. New York, NY, USA: ACM. https://doi.org/10.1145/2133803.2184450
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 2984
Blömer, J. (2012). Turing und Kryptografie. Informatik-Spektrum, 35(4). https://doi.org/10.1007/s00287-012-0622-7
LibreCat | DOI
 

2012 | Dissertation | LibreCat-ID: 3132
Jager, T. (2012). On black-box models of computation in cryptology. Ruhr University Bochum.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 3133
Jager, T., Kohlar, F., Schäge, S., & Schwenk, J. (2012). On the Security of TLS-DHE in the Standard Model. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings (pp. 273--293). https://doi.org/10.1007/978-3-642-32009-5_17
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3134
Hofheinz, D., & Jager, T. (2012). Tightly Secure Signatures and Public-Key Encryption. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings (pp. 590--607). https://doi.org/10.1007/978-3-642-32009-5_35
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3135
Jager, T., Schinzel, S., & Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings (pp. 752--769). https://doi.org/10.1007/978-3-642-33167-1_43
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3136
Hofheinz, D., Jager, T., & Knapp, E. (2012). Waters Signatures with Optimal Security Reduction. In Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings (pp. 66--83). https://doi.org/10.1007/978-3-642-30057-8_5
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 3180
Travkin, O., Wehrheim, H., & Schellhorn, G. (2012). Proving Linearizability of Multiset with Local Proof Obligations. {ECEASST}.
LibreCat
 

2012 | Journal Article | LibreCat-ID: 3181
Ruhroth, T., & Wehrheim, H. (2012). Model evolution and refinement. Sci. Comput. Program., (3), 270--289. https://doi.org/10.1016/j.scico.2011.04.007
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3182
Schellhorn, G., Wehrheim, H., & Derrick, J. (2012). How to Prove Algorithms Linearisable. In P. Madhusudan & S. A. Seshia (Eds.), Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings (pp. 243--259). https://doi.org/10.1007/978-3-642-31424-7_21
LibreCat | DOI
 

Filters and Search Terms

year=2012

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed