Number of items: 82.
UNSPECIFIED, ed.
(2010)
Pervasive Computing, 8th International Conference, Pervasive 2010, Helsinki, Finland, May 17-20, 2010. Proceedings.
Lecture Notes in Computer Science, 6030
.
Springer.
UNSPECIFIED, ed.
(2010)
Pervasive Public Displays, 03.01. - 08.01.2010.
Dagstuhl Seminar Proceedings, 10011
.
Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany.
UNSPECIFIED, ed.
(2010)
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, PLAS 2010, Toronto, ON, Canada, 10 June, 2010.
ACM.
UNSPECIFIED, ed.
(2010)
Proceedings of the 20th International Conference on Automated Planning and Scheduling, ICAPS 2010, Toronto, Ontario, Canada, May 12-16, 2010.
AAAI.
UNSPECIFIED, ed.
(2010)
Smart Graphics, 10th International Symposium on Smart Graphics, Banff, Canada, June 24-26, 2010, Proceedings.
Lecture Notes in Computer Science, 6133
.
Springer.
Backes, Michael and Ciobotaru, Oana and Krohmer, Anton
(2010)
RatFish: A File Sharing Protocol Provably Secure Against Rational Users.
Backes, Michael and Doychev, Goran and Dürmuth, Markus and Köpf, Boris
(2010)
Speaker Recognition in Encrypted Voice-over-IP Traffic.
Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010)
Acoustic Side-Channel Attacks of Printers.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010)
Anonymity and Trust in Distributed Systems.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010)
Anonymous Webs of Trust.
Backes, Michael and Maffei, Matteo and Mohammadi, Esfandiar
(2010)
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2010)
Computationally Sound Verification of Source Code.
Backes, Michael and Unruh, Dominique
(2010)
Computational Soundness of Symbolic Zero-Knowledge Proofs.
Journal of Computer Security, 18 (6).
pp. 1077-1155.
Bohli, Jens-Matthias and Sorge, Christoph and Ugus, Osman
(2010)
A Privacy Model for Smart Metering.
Brzuska, Christina and Busch, Heike and Dagdelen, Özgür and Fischlin, Marc and Franz, Martin and Katzenbeisser, Stefan and Manulis, Mark and Onete, Cristina and Peter, Andreas and Poettering, Bertram and Schröder, Dominique
(2010)
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel
(2010)
TruWalletM: Secure Web Authentication on Mobile Platforms.
Bugiel, Sven and Ekberg, Jan-Erik
(2010)
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
Davies, Nigel and Krüger, Antonio and Langheinrich, Marc and Schmidt, Albrecht and Strohbach, Martin
(2010)
10011 Report - Pervasive Public Displays.
DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Datta, Anupam
(2010)
Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Dittrich, Jens
(2010)
Paper bricks: an alternative to complete-story peer reviewing.
SIGMOD Record, 39 (4).
pp. 31-36.
Doychev, Goran
(2010)
Speaker Recognition in Encrypted Voice Streams.
Bachelors thesis, Saarland University.
Dreyer, Derek and Neis, Georg and Rossberg, Andreas and Birkedal, Lars
(2010)
A relational modal logic for higher-order stateful ADTs.
Driedger, Jonathan
(2010)
Formalization of Game-Transformations.
Bachelors thesis, Saarland University.
Döttling, Nico and de Almeida, Antonio Sobreira and Lazich, Dejan E. and Müller-Quade, Jörn
(2010)
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
Dürmuth, Markus
(2010)
Novel Classes of Side Channels and Covert Channels.
Doctoral thesis, UNSPECIFIED.
Eigner, Fabienne
(2010)
Type-Based Verification of Electronic Voting Systems.
Masters thesis, Saarland University.
Feld, Dominik
(2010)
Anonymity in Online Polls.
Bachelors thesis, Saarland University.
Garg, Deepak and Franklin, Jason and Kaynar, Dilsun Kirli and Datta, Anupam
(2010)
Compositional System Security with Interface-Confined Adversaries.
Electr. Notes Theor. Comput. Sci., 265.
49–71.
Garg, Deepak and Pfenning, Frank
(2010)
A Proof-Carrying File System.
Garg, Deepak and Pfenning, Frank
(2010)
Stateful Authorization Logic: - Proof Theory and a Case Study.
Gehring, Sven and Löchtefeld, Markus and Schöning, Johannes and Gorecky, Dominic and Stephan, Peter and Krüger, Antonio and Rohs, Michael
(2010)
Mobile product customization.
Gomez-Rodriguez, Manuel and Peters, Jan and Hill, Jeremy N. and Schölkopf, Bernhard
(2010)
Closing the sensorimotor loop: Haptic feedback facilitates decoding of arm movement imagery.
Grochulla, Martin
(2010)
Moment Preserving Diffusion in Image Processing.
Masters thesis, Saarland University.
Guha, Saikat and Cheng, Bin and Francis, Paul
(2010)
Challenges in measuring online advertising systems.
Haeberlen, Andreas and Aditya, Paarijaat and Rodrigues, Rodrigo and Druschel, Peter
(2010)
Accountable Virtual Machines.
Hammer, Christian
(2010)
Experiences with PDG-based IFC.
Hein, Matthias and Bühler, Thomas
(2010)
An Inverse Power Method for Nonlinear Eigenproblems with Applications in 1-Spectral Clustering and Sparse PCA.
Hoffmann, Jörg and Fatès, Nazim and Palacios, Héctor
(2010)
Brothers in Arms? On AI Planning and Cellular Automata.
Hoffmann, Jörg and Weber, Ingo and Kraft, Frank Michael
(2010)
SAP Speaks PDDL.
Kate, Aniket and Goldberg, Ian
(2010)
Distributed Private-Key Generators for Identity-Based Cryptography.
Kate, Aniket and Goldberg, Ian
(2010)
Using Sphinx to Improve Onion Routing Circuit Construction.
Kate, Aniket and Zaverucha, Gregory M. and Goldberg, Ian
(2010)
Constant-Size Commitments to Polynomials and Their Applications.
Koller, Alexander and Hoffmann, Jörg
(2010)
Waking Up a Sleeping Rabbit: On Natural-Language Sentence Generation with FF.
Krüger, Antonio and Spassova, Lübomira and Jung, Ralf
(2010)
Innovative Retail Laboratory - Investigating Future Shopping Technologies (Innovative Retail Laboratory - Erforschung von Technologien für das Einkaufen von morgen).
it - Information Technology, 52 (2).
114–119.
Kuhn, Marc and Luecken, Heinrich and Tippenhauer, Nils Ole
(2010)
UWB Impulse Radio Based Distance Bounding.
Lee, Wonwoo and Krüger, Antonio and Thomas, Bruce H. and Wagner, Daniel and Pulli, Kari and Woo, Woontack
(2010)
International Symposium on Ubiquitous Virtual Reality 2009.
IEEE Pervasive Computing, 9 (2).
78–80.
Lund, Rajiv
(2010)
Formale Analyse von Mastermind.
Bachelors thesis, UNSPECIFIED.
Löchtefeld, Markus and Gehring, Sven and Schöning, Johannes and Krüger, Antonio
(2010)
PINwI: pedestrian indoor navigation without infrastructure.
Mampaey, Michael and Vreeken, Jilles
(2010)
Summarising Data by Clustering Items.
Mislove, Alan and Viswanath, Bimal and Gummadi, Krishna P. and Druschel, Peter
(2010)
You are who you know: inferring user profiles in online social networks.
Müller-Quade, Jörn and Unruh, Dominique
(2010)
Long-term Security and Universal Composability.
Journal of Cryptology, 23 (4).
pp. 594-671.
Nakhost, Hootan and Hoffmann, Jörg and Müller, Martin
(2010)
Improving Local Search for Resource-Constrained Planning.
Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010)
Ray - A Secure Microkernel Architecture.
Petrlic, Ronald
(2010)
Integrity Protection for Automated Teller Machines.
Masters thesis, UNSPECIFIED.
Petrlic, Ronald
(2010)
A privacy-preserving Concept for Smart Grids.
Petrlic, Ronald and Krummel, Volker
(2010)
Method for testing system integrity of self-service machine e.g. automated teller machine, involves analyzing digital data by comparing digital data with identity data of self-service machine to make statement about system integrity.
Pfeiffer, Max and Kern, Dagmar and Schöning, Johannes and Döring, Tanja and Krüger, Antonio and Schmidt, Albrecht
(2010)
A multi-touch enabled steering wheel: exploring the design space.
Rickert, Nicolas
(2010)
Digital Watermarking: Methods and Applications for Digital Images.
Bachelors thesis, Saarland University.
Rodrigues, Rodrigo and Druschel, Peter
(2010)
Peer-to-peer systems.
Commun. ACM, 53 (10).
72–82.
Rückert, Markus and Schneider, Michael and Schröder, Dominique
(2010)
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
Schröder, Dominique
(2010)
On the complexity of blind signatures.
Doctoral thesis, Darmstadt University of Technology.
Schöning, Johannes and Löchtefeld, Markus and Rohs, Michael and Krüger, Antonio
(2010)
Projector Phones: A New Class of Interfaces for Augmented Reality.
IJMHCI, 2 (3).
1–14.
Skoruppa, Malte
(2010)
Formal Verification of ElGamal Encryption using a Probabilistic Lambda-Calculus.
Bachelors thesis, Saarland University.
Sorge, Christoph and Niccolini, Saverio and Seedorf, Jan
(2010)
The Legal Ramifications of Call-Filtering Solutions.
IEEE Security & Privacy, 8 (2).
pp. 45-50.
Sorge, Christoph and Seedorf, Jan
(2010)
Method for Supporting Attack Detection in a Distributed System.
Steinke, Florian and Hein, Matthias and Schölkopf, Bernhard
(2010)
Nonparametric Regression between General Riemannian Manifolds.
SIAM J. Imaging Sciences, 3 (3).
527–563.
Tarrach, Thorsten
(2010)
Automatically Verifying 'M' Modelling Language Constraints.
Masters thesis, Saarland University.
Unruh, Dominique
(2010)
Universally Composable Quantum Multi-Party Computation.
Unruh, Dominique
(2010)
The impossibility of computationally sound XOR.
Unruh, Dominique and Müller-Quade, Jörn
(2010)
Universally Composable Incoercibility.
Valkov, Dimitar and Steinicke, Frank and Bruder, Gerd and Hinrichs, Klaus H. and Schöning, Johannes and Daiber, Florian and Krüger, Antonio
(2010)
Touching Floating Objects in Projection-based Virtual Reality Environments.
Vaziri, Mandana and Tip, Frank and Dolby, Julian and Hammer, Christian and Vitek, Jan
(2010)
A Type System for Data-Centric Synchronization.
Vreeken, Jilles
(2010)
Making Pattern Mining Useful.
SIGKDD Explorations, 12 (1).
pp. 75-76.
Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010)
UP '10: Proceedings of the ACM SIGKDD Workshop on Useful Patterns.
ACM Press, New York, NY, USA.
Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010)
Useful Patterns (UP’10) ACM SIGKDD Workshop Report.
SIGKDD Explorations, 12 (2).
pp. 56-58.
Weber, Ingo and Hoffmann, Jörg and Mendling, Jan
(2010)
Beyond soundness: on the verification of semantic business process models.
Distributed and Parallel Databases, 27 (3).
271–343.
Zhang, Bo and Ng, Tze Sing Eugene and Nandi, Animesh and Riedi, Rudolf H. and Druschel, Peter and Wang, Guohui
(2010)
Measurement-based analysis, modeling, and synthesis of the internet delay space.
IEEE/ACM Trans. Netw., 18 (1).
229–242.
Zimmermann, Thomas and Premraj, Rahul and Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin
(2010)
What Makes a Good Bug Report?
IEEE Transactions on Software Engineering, 36 (5).
pp. 618-643.
\vCapkun Srdjan and, Mario and Karame, Ghassan and Tippenhauer, Nils Ole
(2010)
Integrity Regions: Authentication Through Presence in Wireless Networks.
IEEE Transactions on Mobile Computing.
and Dejan E. Lazich and J\"rn M\"ller-Quade, Nico D\"ttling and de Almeida, Antonio Sobreira
(2010)
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
von Luxburg, Ulrike and Radl, Agnes and Hein, Matthias
(2010)
Getting lost in space: Large sample analysis of the resistance distance.
von Zadow, Ulrich and Daiber, Florian and Schöning, Johannes and Krüger, Antonio
(2010)
GlobalData: multi-user interaction with geographic information systems on interactive surfaces.
This list was generated on Sun Dec 22 03:48:49 2024 CET.