Universität Paderborn » SFB 901 » Projects » Project Area C » C1 » Publications

Publications


2017 (1)

Robert Gmyr, Kristian Hinnenthal, Christian Scheideler, Christian Sohler:
Distributed Monitoring of Network Properties: The Power of Hybrid Networks
In Automata, Languages, and Programming - 44th International Colloquium (ICALP). (2017)

[Show Abstract] [Show BibTeX]

2016 (3)

Robert Gmyr, Jonas Lefèvre, Christian Scheideler:
Self-stabilizing Metric Graphs
In Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS). Springer, LNCS, vol. 10083, pp. 248-262 (2016)

[Show Abstract] [Show BibTeX] [DOI]
Johannes Blömer, Gennadij Liske:
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
In Proceedings of the CT-RSA 2016. Springer, LNCS, vol. 9610, pp. 431-447 (2016)

[Show Abstract] [Show BibTeX] [DOI]
Maximilian Drees, Robert Gmyr, Christian Scheideler:
Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration
In Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA). ACM, pp. 417-427 (2016)

[Show Abstract] [Show BibTeX] [DOI]

2015 (4)

Johannes Blömer, Kathlén Kohn:
Voronoi Cells of Lattices with Respect to Arbitrary Norms
Techreport UPB. (2015) (arXiv.org Archive http://arxiv.org/pdf/1512.00720v1.pdf)

[Show Abstract] [Show BibTeX] [DOI]
Johannes Blömer, Jakob Juhnke, Nils Löken:
Short Group Signatures with Distributed Traceability
In Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). Springer, LNCS, vol. 9582, pp. 166-180 (2015)

[Show Abstract] [Show BibTeX] [DOI]
Martina Eikel, Christian Scheideler:
IRIS: A Robust Information System Against Insider DoS Attacks
In Transactions on Parallel Computing, vol. 2, no. 3, pp. 18:1-18:33. ACM (2015)

[Show Abstract] [Show BibTeX] [DOI]
Johannes Blömer, Jakob Juhnke, Christina Kolb:
Anonymous and Publicly Linkable Reputation Systems
In Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC). Springer, LNCS, vol. 8975, pp. 478-488 (2015)

[Show Abstract] [Show BibTeX] [DOI]

2014 (16)

Sonja Brangewitz, Alexander Jungmann, Ronald Petrlic, Marie Christin Platenius:
Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services
In Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION). IARIA XPS Press, pp. 49-57 (2014)

[Show Abstract] [Show BibTeX] [DOI]
Christoph Sorge:
The Legal Classification of Identity-Based Signatures
In Computer Law and Security Review, vol. 30, no. 2, pp. 126-136. Elsevier (2014)

[Show Abstract] [Show BibTeX] [DOI]
Johannes Blömer, Peter Günther, Gennadij Liske:
Tampering attacks in pairing-based cryptography
In Proceedings of Fault Tolerance and Diagnosis in Cryptography (FDTC). IEEE Computer Society, pp. 1-7 (2014)

[Show Abstract] [Show BibTeX] [DOI]
Ronald Petrlic, Alexander Jungmann, Marie Christin Platenius, Wilhelm Schaefer, Christoph Sorge:
Security and Privacy Challenges in On-The-Fly Computing
In Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014). De Gruyter Oldenbourg, pp. 131-142 (2014)

[Show Abstract] [Show BibTeX] [DOI]
Christian Scheideler, Alexander Setzer, Martina Eikel:
RoBuSt: A Crash-Failure-Resistant Distributed Storage System
In Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS). Springer, LNCS, vol. 8878, pp. 107-122 (2014)

[Show Abstract] [Show BibTeX] [DOI]
Sebastian Kniesburges, Andreas Koutsopoulos, Christian Scheideler:
Re-Chord: A Self-stabilizing Chord Overlay Network
In Theory of Computing Systems, vol. 55, no. 3, pp. 591-612. Springer (2014)

[Show Abstract] [Show BibTeX] [DOI]
Ronald Petrlic, Sascha Lutters, Christoph Sorge:
Privacy-Preserving Reputation Management
In Proceedings of the 29th Symposium On Applied Computing (SAC). ACM, pp. 1712-1718 (2014)

[Show Abstract] [Show BibTeX] [DOI]
Ronald Petrlic, Christoph Sorge:
Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
In Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, pp. 1-5 (2014)

[Show Abstract] [Show BibTeX] [DOI]
Baruch Awerbuch, Andrea W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang:
Principles of Robust Medium Access and an Application to Leader Election
In Transactions on Algorithms, vol. 10, no. 4. ACM (2014)

[Show Abstract] [Show BibTeX] [DOI]
Marie Christin Platenius, Svetlana Arifulina, Ronald Petrlic, Wilhelm Schaefer:
Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching
In Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet. Springer, Communications in Computer and Information Science, vol. 508, pp. 6-17 (2014)

[Show Abstract] [Show BibTeX] [DOI]
Alexander Jungmann, Sonja Brangewitz, Ronald Petrlic, Marie Christin Platenius:
Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services
In International Journal On Advances in Intelligent Systems (IntSys), vol. 7, no. 3&4, pp. 572-594. ThinkMind (2014)

[Show Abstract] [Show BibTeX] [DOI]
Matthias Feldotto, Christian Scheideler, Kalman Graffi:
HSkip+: A Self-Stabilizing Overlay Network for Nodes with Heterogeneous Bandwidths
In Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, pp. 1-10 (2014)

[Show Abstract] [Show BibTeX] [DOI]
Christoph Sorge, Ronald Petrlic:
Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen
In Tagungsband des 17. Internationalen Rechtsinformatik Symposions. Austrian Computer Society (2014)

[Show Abstract] [Show BibTeX]
Johannes Blömer, Gennadij Liske:
Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
Techreport UPB. (2014) (Cryptology ePrint Archive https://eprint.iacr.org/2014/511.pdf)

[Show Abstract] [Show BibTeX]
Adrian Ogierman, Andrea W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang:
Competitive MAC under adversarial SINR
In Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM). IEEE Computer Society, pp. 2751-2759 (2014)

[Show Abstract] [Show BibTeX] [DOI]
Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert:
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
In Proceedings of Fault Tolerance and Diagnosis in Cryptography (FDTC). IEEE, pp. 123-136 (2014)

[Show Abstract] [Show BibTeX] [DOI]

2013 (10)

Ronald Petrlic, Stephan Sekula:
Unlinkable content playbacks in a multiparty DRM system
In Wang, Lingyu and Shafiq, Basit (eds.): Data and Applications Security and Privacy XXVII. Springer Berlin Heidelberg, Lecture Notes in Computer Science, vol. 7964, pp. 289-296 (2013)

[Show Abstract] [Show BibTeX] [DOI]
Nakul Joshi, Ronald Petrlic:
Towards practical privacy-preserving Digital Rights Management for Cloud Computing
In Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC). IEEE Computer Society, pp. 259-264 (2013)

[Show Abstract] [Show BibTeX] [DOI]
Christoph Sorge:
The Legal Classification of Identity-Based Signatures
Techreport UPB. (2013) (Cryptology ePrint Archiv https://eprint.iacr.org/2013/271)

[Show Abstract] [Show BibTeX] [DOI]
Johannes Blömer, Peter Günther, Volker Krummel:
Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study
In Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). Birkhäuser/Springer, pp. 98-105 (2013)

[Show Abstract] [Show BibTeX]
Martina Eikel, Christian Scheideler:
IRIS: A Robust Information System Against Insider DoS-Attacks
In Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA). ACM, pp. 119-129 (2013) (won the SPAA Best Paper Award)

[Show Abstract] [Show BibTeX] [DOI]
Heinrich Riebler, Tobias Kenter, Christoph Sorge, Christian Plessl:
FPGA-accelerated Key Search for Cold-Boot Attacks against AES
In Proceedings of the International Conference on Field-Programmable Technology (FPT). IEEE, pp. 386-389 (2013)

[Show Abstract] [Show BibTeX] [DOI]
Johannes Blömer, Gennadij Liske:
Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles
Techreport UPB. (2013) (Cryptology ePrint Archiv https://eprint.iacr.org/2013/646)

[Show Abstract] [Show BibTeX]
Sebastian Kniesburges, Andreas Koutsopoulos, Christian Scheideler:
CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system
In Proceedings of the 27th International Symposium on Distributed Computing (DISC). Springer, LNCS, vol. 8205, pp. 537-549 (2013)

[Show Abstract] [Show BibTeX] [DOI]
Kalman Graffi, Markus Benter, Mohammad Divband, Sebastian Kniesburges, Andreas Koutsopoulos:
Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network
In Proceedings of the Conference on Networked Systems (NetSys). IEEE Computer Society, pp. 27-34 (2013)

[Show Abstract] [Show BibTeX] [DOI]
Ronald Petrlic, Stephan Sekula, Christoph Sorge:
A privacy-friendly Architecture for future Cloud Computing
In International Journal of Grid and Utility Computing, vol. 4, no. 4, pp. 265-277. Inderscience Publishers (2013)

[Show Abstract] [Show BibTeX] [DOI]

2012 (6)

Andrea W. Richa, Christian Scheideler (eds.):
Stabilization, Safety, and Security of Distributed Systems
Springer, Lecture Notes in Computer Science, vol. 7596 (2012)

[Show Abstract] [Show BibTeX] [DOI]
Maximilian Drees, Martina Huellmann (married name: Eikel), Andreas Koutsopoulos, Christian Scheideler:
Self-Organizing Particle Systems
In Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS). IEEE Computer Society, pp. 1272-1283 (2012)

[Show Abstract] [Show BibTeX] [DOI]
Ronald Petrlic:
Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme
In Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS). Springer, LNCS, vol. 7672, pp. 194-211 (2012)

[Show Abstract] [Show BibTeX] [DOI]
Ronald Petrlic, Christoph Sorge:
Privacy-Preserving DRM for Cloud Computing
In Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA). IEEE Computer Society, pp. 1286-1291 (2012)

[Show Abstract] [Show BibTeX] [DOI]
Ronald Petrlic:
Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment
In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE Computer Society, pp. 958-963 (2012)

[Show Abstract] [Show BibTeX] [DOI]
Andrea W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang:
Competitive and fair throughput for co-existing networks under adversarial interference
In Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC). ACM, pp. 291-300 (2012)

[Show Abstract] [Show BibTeX] [DOI]

2011 (2)

Benjamin Doerr, Leslie Ann Goldberg, Lorenz Minder, Thomas Sauerwald, Christian Scheideler:
Stabilizing consensus with the power of two choices
In Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA). ACM, pp. 149-158 (2011)

[Show Abstract] [Show BibTeX] [DOI]
Andrea W. Richa, Christian Scheideler, Phillip Stevens:
Self-Stabilizing DeBruijn Networks
In Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS). Springer, LNCS, vol. 6976, pp. 416-430 (2011)

[Show Abstract] [Show BibTeX] [DOI]