Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1879 Publications
2015 | Mastersthesis | LibreCat-ID: 312
Schleiter, Patrick. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Journal Article | LibreCat-ID: 3120
Böhl, Florian, et al. “Confined Guessing: New Signatures From Standard Assumptions.” J. Cryptology, no. 1, 2015, pp. 176--208, doi:10.1007/s00145-014-9183-z.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 3121
Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196, doi:10.1145/2810103.2813657.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 3122
Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425, doi:10.1007/978-3-319-24174-6_21.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 3123
Heuer, Felix, et al. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51, doi:10.1007/978-3-662-46447-2_2.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, Florian, et al. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494, doi:10.1007/978-3-662-46447-2_21.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 3125
Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143, doi:10.1007/978-3-662-46497-7_5.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 3126
Bader, Christoph, et al. “Tightly-Secure Authenticated Key Exchange.” Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658, doi:10.1007/978-3-662-46494-6_26.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 313
Börding, Paul, et al. “Comprehensive Service Matching with MatchBox.” 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977, doi:10.1145/2786805.2803181.
LibreCat
| Files available
| DOI
2015 | Report | LibreCat-ID: 314
Brangewitz, Sonja, and Jochen Manegold. Competition and Product Innovation of Intermediaries in a Differentiated Duopoly. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 315
Jungmann, Alexander, et al. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.
LibreCat
| Files available
2015 | Bachelorsthesis | LibreCat-ID: 316
Pautz, Jannis. Budget Games with Priced Strategies. Universität Paderborn, 2015.
LibreCat
2015 | Journal Article | LibreCat-ID: 3162
Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture Reconfiguration.” Computer Science - R & D, no. 3–4, 2015, pp. 303--320, doi:10.1007/s00450-014-0259-7.
LibreCat
| Files available
| DOI
2015 | Conference Paper | LibreCat-ID: 3163
Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog.” Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, edited by Roland Meyer et al., 2015, pp. 3--4, doi:10.1007/978-3-319-23506-6_1.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 3164
Derrick, John, et al. “Verifying Opacity of a Transactional Mutex Lock.” {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, edited by Nikolaj Bj{\o}rner and Frank S. de Boer, 2015, pp. 161--177, doi:10.1007/978-3-319-19249-9_11.
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 3165
Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.” Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, edited by Nir Piterman, 2015, pp. 104--119, doi:10.1007/978-3-319-26287-1_7.
LibreCat
| DOI
2015 | Conference (Editor) | LibreCat-ID: 3166
Meyer, Roland, et al., editors. Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. 2015, doi:10.1007/978-3-319-23506-6.
LibreCat
| DOI
2015 | Dissertation | LibreCat-ID: 317
Jähn, Claudius. Bewertung von Renderingalgorithmen für komplexe 3-D-Szenen. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Dissertation | LibreCat-ID: 318
Huma, Zille. Automatic Service Discovery and Composition for Heterogeneous Service Partners. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 319
Mohr, Felix, et al. “Automated Online Service Composition.” Proceedings of the 12th IEEE International Conference on Services Computing (SCC), 2015, pp. 57--64, doi:10.1109/SCC.2015.18.
LibreCat
| Files available
| DOI