Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

1957 Publications


2016 | Journal Article | LibreCat-ID: 3884 | OA
Kou Y, Förstner J. Discrete plasmonic solitons in graphene-coated nanowire arrays. Optics Express. 2016;24(5):4714. doi:10.1364/oe.24.004714
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 3886
Alberti J, Linnenbank H, Linden S, Grynko Y, Förstner J. The role of electromagnetic interactions in second harmonic generation from plasmonic metamaterials. Applied Physics B. 2016;122(2):45-50. doi:10.1007/s00340-015-6311-x
LibreCat | Files available | DOI
 

2016 | Mastersthesis | LibreCat-ID: 2898
Weis E. Searchable Encryption.; 2016.
LibreCat
 

2016 | Book Chapter | LibreCat-ID: 28995
Eickelmann B, Gerick J, Drossel K, Bos W. Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven. In: Eickelmann B, Gerick J, Drossel K, Bos W, eds. ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen. 7-32. Waxmann; 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2947
Blömer J, Günther P. Singular Curve Point Decompression Attack. In: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE; 2016. doi:10.1109/fdtc.2015.17
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: Mathematical Aspects of Computer and Information Sciences. Cham: Springer International Publishing; 2016:151-165. doi:10.1007/978-3-319-32859-1_13
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: Algorithm Engineering. Cham: Springer International Publishing; 2016:81-116. doi:10.1007/978-3-319-49487-6_3
LibreCat | DOI
 

2016 | Preprint | LibreCat-ID: 2969 | OA
Blömer J, Brauer S, Bujna K. Hard-Clustering with Gaussian Mixture Models. 2016.
LibreCat | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2970
Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances in Knowledge Discovery and Data Mining. Cham: Springer International Publishing; 2016:296-308. doi:10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2016 | Report | LibreCat-ID: 2971
Blömer J, Günther P. Effizienz Und Sicherheit Paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops; 2016.
LibreCat
 

2016 | Journal Article | LibreCat-ID: 3106
Duman P, Trockel W. On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game. Journal of Mechanism and Institution Design. 2016;1(1):83-106. doi:10.22574/jmid.2016.12.003
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 3112
Hofheinz D, Jager T. Tightly secure signatures and public-key encryption. Des Codes Cryptography. 2016;(1):29--61. doi:10.1007/s10623-015-0062-x
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3113
Heuer F, Jager T, Schäge S, Kiltz E. Selective opening security of practical public-key encryption schemes. IET Information Security. 2016;(6):304--318. doi:10.1049/iet-ifs.2015.0507
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3114
Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. PoPETs. 2016;(3):62--82.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 3115
Hofheinz D, Jager T, Khurana D, Sahai A, Waters B, Zhandry M. How to Generate and Use Universal Samplers. In: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. ; 2016:715--744. doi:10.1007/978-3-662-53890-6_24
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3116
Horst M, Grothe M, Jager T, Schwenk J. Breaking PPTP VPNs via RADIUS Encryption. In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings. ; 2016:159--175. doi:10.1007/978-3-319-48965-0_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3117
Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic Reductions. In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. ; 2016:273--304. doi:10.1007/978-3-662-49896-5_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz D, Jager T, Rupp A. Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II. ; 2016:146--168. doi:10.1007/978-3-662-53644-5_6
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz D, Jager T. Verifiable Random Functions from Standard Assumptions. In: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I. ; 2016:336--362. doi:10.1007/978-3-662-49096-9_14
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3157
Beringer S, Wehrheim H. Verification of AUTOSAR Software Architectures with Timed Automata. In: H. ter Beek M, Gnesi S, Knapp A, eds. Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings. Lecture Notes in Computer Science. ; 2016:189--204. doi:10.1007/978-3-319-45943-1_13
LibreCat | Files available | DOI
 

Filters and Search Terms

year=2016

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed