Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1768 Publications
2015 | Bachelorsthesis | LibreCat-ID: 308
Die Wirksamkeit von Zertifikaten als Qualitätssignal
A. Reimann, Die Wirksamkeit von Zertifikaten als Qualitätssignal, Universität Paderborn, 2015.
LibreCat
A. Reimann, Die Wirksamkeit von Zertifikaten als Qualitätssignal, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 309
Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen
B. Topal, Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen, Universität Paderborn, 2015.
LibreCat
B. Topal, Die Einführung der EU-Merger Guidelines - Effizienz und Wohlfahrtswirkungen, Universität Paderborn, 2015.
2015 | Bachelorsthesis | LibreCat-ID: 310
Design of an Evaluation Strategy for Fuzzy Service Matching
M. Bruns, Design of an Evaluation Strategy for Fuzzy Service Matching, Universität Paderborn, 2015.
LibreCat
M. Bruns, Design of an Evaluation Strategy for Fuzzy Service Matching, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 312
Constructions of Fully Secure Predicate Encryption Schemes
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes, Universität Paderborn, 2015.
LibreCat
| Files available
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes, Universität Paderborn, 2015.
2015 | Journal Article | LibreCat-ID: 3120
Confined Guessing: New Signatures From Standard Assumptions
F. Böhl, D. Hofheinz, T. Jager, J. Koch, C. Striecks, J. Cryptology (2015) 176--208.
LibreCat
| DOI
F. Böhl, D. Hofheinz, T. Jager, J. Koch, C. Striecks, J. Cryptology (2015) 176--208.
2015 | Conference Paper | LibreCat-ID: 3121
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.
LibreCat
| DOI
T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.
2015 | Conference Paper | LibreCat-ID: 3122
Practical Invalid Curve Attacks on TLS-ECDH
T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.
LibreCat
| DOI
T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.
2015 | Conference Paper | LibreCat-ID: 3123
On the Selective Opening Security of Practical Public-Key Encryption Schemes
F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.
LibreCat
| DOI
F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.
2015 | Conference Paper | LibreCat-ID: 3124
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.
LibreCat
| DOI
F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.
2015 | Conference Paper | LibreCat-ID: 3125
Verifiable Random Functions from Weaker Assumptions
T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.
LibreCat
| DOI
T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.
2015 | Conference Paper | LibreCat-ID: 3126
Tightly-Secure Authenticated Key Exchange
C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.
LibreCat
| DOI
C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.
2015 | Conference Paper | LibreCat-ID: 313
Comprehensive Service Matching with MatchBox
P. Börding, M. Bruns, M.C. Platenius, in: 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977.
LibreCat
| Files available
| DOI
P. Börding, M. Bruns, M.C. Platenius, in: 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977.
2015 | Report | LibreCat-ID: 314
Competition and Product Innovation of Intermediaries in a Differentiated Duopoly
S. Brangewitz, J. Manegold, Competition and Product Innovation of Intermediaries in a Differentiated Duopoly, Universität Paderborn, 2015.
LibreCat
| Files available
S. Brangewitz, J. Manegold, Competition and Product Innovation of Intermediaries in a Differentiated Duopoly, Universität Paderborn, 2015.
2015 | Conference Paper | LibreCat-ID: 315
Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study
A. Jungmann, J. Jatzkowski, B. Kleinjohann, in: Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.
LibreCat
| Files available
A. Jungmann, J. Jatzkowski, B. Kleinjohann, in: Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.
2015 | Bachelorsthesis | LibreCat-ID: 316
Budget Games with priced strategies
J. Pautz, Budget Games with Priced Strategies, Universität Paderborn, 2015.
LibreCat
J. Pautz, Budget Games with Priced Strategies, Universität Paderborn, 2015.
2015 | Journal Article | LibreCat-ID: 3162
Temporal plans for software architecture reconfiguration
S. Ziegert, H. Wehrheim, Computer Science - R & D (2015) 303--320.
LibreCat
| Files available
| DOI
S. Ziegert, H. Wehrheim, Computer Science - R & D (2015) 303--320.
2015 | Conference Paper | LibreCat-ID: 3163
From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog
R. Meyer, H. Wehrheim, in: R. Meyer, A. Platzer, H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015, pp. 3--4.
LibreCat
| DOI
R. Meyer, H. Wehrheim, in: R. Meyer, A. Platzer, H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015, pp. 3--4.
2015 | Conference Paper | LibreCat-ID: 3164
Verifying Opacity of a Transactional Mutex Lock
J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\o}rner, F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.
LibreCat
| DOI
J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\o}rner, F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.
2015 | Conference Paper | LibreCat-ID: 3165
{TSO} to {SC} via Symbolic Execution
H. Wehrheim, O. Travkin, in: N. Piterman (Ed.), Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, 2015, pp. 104--119.
LibreCat
| DOI
H. Wehrheim, O. Travkin, in: N. Piterman (Ed.), Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, 2015, pp. 104--119.
2015 | Conference (Editor) | LibreCat-ID: 3166
Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings
R. Meyer, A. Platzer, H. Wehrheim, eds., Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015.
LibreCat
| DOI
R. Meyer, A. Platzer, H. Wehrheim, eds., Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015.