Startseite UR

Bibliographie der Universität Regensburg

Exportieren als
[feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Gruppieren nach: Datum | Autoren | Dokumentenart | Keine Gruppierung
Anzahl der Einträge in dieser Kategorie: 39.

Liedel, Manuel (2013) Sichere Mehrparteienberechnungen und datenschutzfreundliche Klassifikation auf Basis horizontal partitionierter Datenbanken. Dissertation, Universität Regensburg.

Lory, Peter (2012) Enhancing the Efficiency in Privacy Preserving Learning of Decision Trees in Partitioned Databases. In: Domingo-Ferrer, Josep und Tinnirello, Ilenia, (eds.) Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings. Lecture notes in computer science, 7556. Springer, Berlin, S. 322-335. ISBN 978-3-642-33626-3. Volltext nicht vorhanden.

Lory, Peter und Liedel, Manuel (2012) Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion. In: Susilo, Willy und Mu, Yi und Seberry, Jennifer, (eds.) Information security and privacy ; 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings. Lecture notes in computer science, 7372. Springer, Berlin, S. 57-70. ISBN 978-3-642-31447-6. Volltext nicht vorhanden.

Lory, Peter (2012) Mehrparteienberechnungen und Tschebyscheff-Polynome. In: Konferenz "Cloud & Klein" - IT im Spannungsfeld zwischen Servercluster und Sensornetz, 26.04.2012, Wien.

Liedel, Manuel (2012) Secure Distributed Computation of the Square Root and Applications. In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), 9.4-12.4.2012, Hangzhou, China. (Im Druck)

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter und Wenzl, Jürgen (2012) Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography. In: Obaidat, M. S. und Sevillano, J. L. und Filipe, J., (eds.) E-Business and Telecommunications : ICETE 2011 , Seville, Spain, July 18-21. Communications in Computer and Information Science, 314. Springer, Berlin, S. 74-81. ISBN 978-3-642-35755-8. Volltext nicht vorhanden.

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter und Wenzl, Jürgen (2011) Optimizing cryptographic threshold schemes for the use in wireless sensor networks. In: Obaidat, Mohammad S. und Sevillano, Jose Luis und Ortega, Eusebi Calle, (eds.) Proceedings of DCNET 2011 ‑ International Conference on Data Communication Networking, July 2011. SciTePress - Science and Technology Publications, Seville, Spain, S. 75-78. ISBN 978-989-8425-69-0.

Lory, Peter und Wenzl, Jürgen (2011) A Note on Secure Multiparty Multiplication. Working Paper, Regensburg.

Lory, Peter (2011) On Petri Net Representations of Cryptographic Workflows in Electronic Government. In: Sprague, Ralph H. Jr., (ed.) Proceedings of the Forty-Fourth Annual Hawaii International Conference on Systems Sciences. IEEE Computer Society Conference Publishing Services, Los Alamitos, CA. ISBN 978-0-7695-4282-9.

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter und Wenzl, Jürgen (2010) Applicability of Multiparty Computation Schemes for Wireless Sensor Networks. In: Sevillano, Luis und Obaidat, Mohammad S. und Nicopolitidis, Petros, (eds.) Proceedings of DCNET 2010 ‑ International Conference on Data Communication Networking, 26‑28 July 2010. SciTePress - Science and Technology Publications, Athens, Greece, S. 125-128. ISBN 978-989-8425-25-6.

Wenzl, Jürgen (2010) Laufzeitanalyse dreier Versionen eines Mehrparteien-Multiplikationsprotokolls. Regensburger Diskussionsbeiträge zur Wirtschaftswissenschaft 440, Working Paper, Regensburg.

Lory, Peter (2009) Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol. In: Falk, Rainer und Goudalo, Wilson und Chen, Eric Y. und Savola, Reijo und Popescu, Manuela, (eds.) The Third International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2009). The Institute of Electrical and Electronics Engineers, Inc., S. 286-291. ISBN 978-0-7695-3668-2. Zugang zum Volltext eingeschränkt.

Lory, Peter (2009) Reducing the Complexity in the Distributed Computation of Private RSA Keys. In: Boyd, Colin und Nieto, Juan Gonzales, (eds.) Information Security and Privacy: Proceedings of the 14th Australasian Conference, ACISP 2009. Lecture Notes in Computer Science, 5594. Springer, Berlin, S. 250-263. ISBN 3-642-02619-2. Zugang zum Volltext eingeschränkt.

Dresp, Wiebke (2008) Verteiltes Datenverwaltungssystem für Authentifizierungs- und Autorisierungsinfrastrukturen: P2P-ZuSI. Formales Modell und Sicherheitsanalyse. Dissertation, Universität Regensburg.

Lory, Peter (2008) Accelerating the Distributed Multiplication Protocol with Applications to the Distributed Miller-Rabin Primality Test. In: Breitner, Michael H. und Denk, Georg und Rentrop, Peter, (eds.) From Nano to Space: Applied Mathematics Inspired by Roland Bulirsch. Springer, Berlin, S. 245-257. ISBN 978-3-540-74238-8. Volltext nicht vorhanden.

Lory, Peter (2007) Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values. In: Proceedings of the 21st International Conference on Advanced Networking and Applications (AINA 2007), Symposium on Security in Networks and Distributed Systems (SSNDS-07). IEEE Computer Society, Los Alamitos, Calif., S. 415-419. ISBN 0-7695-2847-3; 978-0-7695-2847-2.

Wölfl, Thomas (2005) Public-Key-Infrastructure Based on a Peer-to-Peer Network. In: Sprague, Ralph H., (ed.) Proceedings of the 38th Annual Hawaii International Conference on System Sciences: 3 - 6 January 2005, Big Island, Hawaii, [Hilton Waikoloa]; abstracts and CD-ROM of full papers. IEEE Computer Society, Los Alamitos, Calif., 200a. ISBN 0-7695-2268-8. Volltext nicht vorhanden.

Wölfl, Thomas und Wünschmann, S. (2005) Public-Key-Infrastrukturen in einer Peer-to-Peer Umgebung. In: Cremers, Armin B. und Manthey, Rainer und Martini, Peter und Steinhage, Volker, (eds.) Informatik 2005 - Informatik LIVE! 19.-22. September 2005 in Bonn. Gesellschaft für Informatik, Bonn, S. 643-647. Volltext nicht vorhanden.

Dresp, Wiebke (2005) Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. In: Dittmann, Jana, (ed.) Communications and Multimedia Security. Lecture Notes in Computer Science, 3677. Springer, Berlin, S. 230-239. ISBN 978-3-540-28791-9. Zugang zum Volltext eingeschränkt.

Lory, Peter (2003) A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net. In: Aalst, Wil van der, (ed.) Business Process Management. Lecture Notes in Computer Science, 2678. Springer, Berlin, S. 232-245. ISBN 978-3-540-40318-0. Zugang zum Volltext eingeschränkt.

Lory, Peter (2003) A coloured Petri net trust model. In: Proceedings of the 14th International Workshop on Database and Expert Systems Applications. IEEE Computer Society, Los Alamitos, Calif., S. 415-419. ISBN 0-7695-1993-8.

Lory, Peter und Dietl, D. (2000) Neural networks for two-group classification problems with monotonicity hints. In: Decker, Reinhold und Gaul, Wolfgang, (eds.) Classification and Information Processing at the Turn of the Millennium. Springer, Berlin, S. 113-118. ISBN 3-540-67589-2.

Lory, Peter (1993) A mathematical modelling technique for renal counterflow systems. Applied Mathematics Letters (6), S. 83-87.

Lory, Peter (1993) Recent advances in the modelling of renal function. Technology and Health Care, S. 166-167.

Lory, Peter und Breinbauer, M. (1991) The kidney model as an inverse problem. Applied Mathematics and Computation (44), S. 195-223.

Lory, Peter (1990) Simulation of VLSI-circuits: relaxation techniques. Proceedings of the Third European Conference on Mathematics in Industry ECMI, S. 409-414.

Lory, Peter (1989) Numerical aspects of waveform relaxation. In: Dafermos, C. und Ladas, G. und Papanicolaou, G., (eds.) Differential Equations: Proceedings of the 1987 EQUADIFF-Conference. Marcel Dekker, New York, S. 451-458. ISBN 0-8247-8077-9.

Lory, Peter (1988) Simulation of integrated circuits: numerical techniques. Mathematical and Computer Modelling (11), S. 858-863.

Lory, Peter (1987) A multinephron model of the renal concentrating mechanism. Mathematical Modelling (8), S. 597-598.

Lory, Peter (1987) Effectiveness of a salt transport cascade in the renal medulla: computer simulations. American Journal of Physiology (252), F1095-F1102.

Lory, Peter (1985) Active NaCl transport into the descending limbs of Henle's loops (DLH) enhances the NaCl concentration gradient in the renal inner medulla. Pflügers Archiv - European Journal of Physiology (405), R35.

Lory, Peter, Horster, Michael und Gilg, Albert (1984) Determinants of axial osmotic gradients in the differentiating countercurrent system. American Journal of Physiology (246), F124-F132.

Lory, Peter und Hiltmann, P. (1983) On oxygen diffusion in a spherical cell with Michaelis-Menten oxygen uptake kinetics. Bulletin of Mathematical Biology (45), S. 661-664.

Lory, Peter, Gilg, Albert und Horster, Michael (1983) Renal countercurrent system: role of collectingduct convergence and pelvic urea predicted from a mathematical model. Bulletin of Mathematical Biology (45), S. 661-664.

Lory, Peter, Gilg, Albert und Horster, Michael (1981) Computation of renal osmotic work in a "passive" central core model incorporating medullary geometry and pelvic urea reflux. Pflügers Archiv - European Journal of Physiology (391), R27.

Lory, Peter, Gilg, Albert und Horster, Michael (1981) Influence of ion transport and cortico-medullary cytoarchitecture on solute concentrations in the differentiating kidney: predictions from a model simulation analysis. Pflügers Archiv - European Journal of Physiology (391), R16.

Lory, Peter (1980) Enlarging the domain of convergence for multiple shooting by the homotopy method. Numerische Mathematik (35), S. 231-240.

Lory, Peter (1980) Numerical solution of a kidney model by multiple shooting. Mathematical Biosciences (50), S. 117-128.

Lory, Peter, Diekhoff, H.-J., Oberle, H.-J., Pesch, H.-J., Rentrop, P. und Seydel, R. (1977) Comparing routines for the numerical solution of initial value problems of ordinary differential equations in multiple shooting. Numerische Mathematik (27), S. 449-469.

Diese Liste wurde erzeugt am Thu Mar 28 02:58:02 2024 CET.
  1. Universität

Universitätsbibliothek

Publikationsserver

Kontakt:

Publizieren: oa@ur.de
0941 943 -4239 oder -69394

Dissertationen: dissertationen@ur.de
0941 943 -3904

Forschungsdaten: datahub@ur.de
0941 943 -5707

Ansprechpartner