Go to content
UR Home

Bibliography of the Universität Regensburg

Export as
[feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Creators | Item type | No Grouping
Number of items at this level: 39.

Article

Lory, Peter (1993) A mathematical modelling technique for renal counterflow systems. Applied Mathematics Letters (6), pp. 83-87.

Lory, Peter (1993) Recent advances in the modelling of renal function. Technology and Health Care, pp. 166-167.

Lory, Peter and Breinbauer, M. (1991) The kidney model as an inverse problem. Applied Mathematics and Computation (44), pp. 195-223.

Lory, Peter (1990) Simulation of VLSI-circuits: relaxation techniques. Proceedings of the Third European Conference on Mathematics in Industry ECMI, pp. 409-414.

Lory, Peter (1988) Simulation of integrated circuits: numerical techniques. Mathematical and Computer Modelling (11), pp. 858-863.

Lory, Peter (1987) A multinephron model of the renal concentrating mechanism. Mathematical Modelling (8), pp. 597-598.

Lory, Peter (1987) Effectiveness of a salt transport cascade in the renal medulla: computer simulations. American Journal of Physiology (252), F1095-F1102.

Lory, Peter (1985) Active NaCl transport into the descending limbs of Henle's loops (DLH) enhances the NaCl concentration gradient in the renal inner medulla. Pflügers Archiv - European Journal of Physiology (405), R35.

Lory, Peter, Horster, Michael and Gilg, Albert (1984) Determinants of axial osmotic gradients in the differentiating countercurrent system. American Journal of Physiology (246), F124-F132.

Lory, Peter and Hiltmann, P. (1983) On oxygen diffusion in a spherical cell with Michaelis-Menten oxygen uptake kinetics. Bulletin of Mathematical Biology (45), pp. 661-664.

Lory, Peter, Gilg, Albert and Horster, Michael (1983) Renal countercurrent system: role of collectingduct convergence and pelvic urea predicted from a mathematical model. Bulletin of Mathematical Biology (45), pp. 661-664.

Lory, Peter, Gilg, Albert and Horster, Michael (1981) Computation of renal osmotic work in a "passive" central core model incorporating medullary geometry and pelvic urea reflux. Pflügers Archiv - European Journal of Physiology (391), R27.

Lory, Peter, Gilg, Albert and Horster, Michael (1981) Influence of ion transport and cortico-medullary cytoarchitecture on solute concentrations in the differentiating kidney: predictions from a model simulation analysis. Pflügers Archiv - European Journal of Physiology (391), R16.

Lory, Peter (1980) Enlarging the domain of convergence for multiple shooting by the homotopy method. Numerische Mathematik (35), pp. 231-240.

Lory, Peter (1980) Numerical solution of a kidney model by multiple shooting. Mathematical Biosciences (50), pp. 117-128.

Lory, Peter, Diekhoff, H.-J., Oberle, H.-J., Pesch, H.-J., Rentrop, P. and Seydel, R. (1977) Comparing routines for the numerical solution of initial value problems of ordinary differential equations in multiple shooting. Numerische Mathematik (27), pp. 449-469.

Book section

Lory, Peter (2012) Enhancing the Efficiency in Privacy Preserving Learning of Decision Trees in Partitioned Databases. In: Domingo-Ferrer, Josep and Tinnirello, Ilenia, (eds.) Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings. Lecture notes in computer science, 7556. Springer, Berlin, pp. 322-335. ISBN 978-3-642-33626-3. Fulltext not available.

Lory, Peter and Liedel, Manuel (2012) Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion. In: Susilo, Willy and Mu, Yi and Seberry, Jennifer, (eds.) Information security and privacy ; 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings. Lecture notes in computer science, 7372. Springer, Berlin, pp. 57-70. ISBN 978-3-642-31447-6. Fulltext not available.

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter and Wenzl, Jürgen (2012) Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography. In: Obaidat, M. S. and Sevillano, J. L. and Filipe, J., (eds.) E-Business and Telecommunications : ICETE 2011 , Seville, Spain, July 18-21. Communications in Computer and Information Science, 314. Springer, Berlin, pp. 74-81. ISBN 978-3-642-35755-8. Fulltext not available.

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter and Wenzl, Jürgen (2011) Optimizing cryptographic threshold schemes for the use in wireless sensor networks. In: Obaidat, Mohammad S. and Sevillano, Jose Luis and Ortega, Eusebi Calle, (eds.) Proceedings of DCNET 2011 ‑ International Conference on Data Communication Networking, July 2011. SciTePress - Science and Technology Publications, Seville, Spain, pp. 75-78. ISBN 978-989-8425-69-0.

Lory, Peter (2011) On Petri Net Representations of Cryptographic Workflows in Electronic Government. In: Sprague, Ralph H. Jr., (ed.) Proceedings of the Forty-Fourth Annual Hawaii International Conference on Systems Sciences. IEEE Computer Society Conference Publishing Services, Los Alamitos, CA. ISBN 978-0-7695-4282-9.

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter and Wenzl, Jürgen (2010) Applicability of Multiparty Computation Schemes for Wireless Sensor Networks. In: Sevillano, Luis and Obaidat, Mohammad S. and Nicopolitidis, Petros, (eds.) Proceedings of DCNET 2010 ‑ International Conference on Data Communication Networking, 26‑28 July 2010. SciTePress - Science and Technology Publications, Athens, Greece, pp. 125-128. ISBN 978-989-8425-25-6.

Lory, Peter (2009) Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol. In: Falk, Rainer and Goudalo, Wilson and Chen, Eric Y. and Savola, Reijo and Popescu, Manuela, (eds.) The Third International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2009). The Institute of Electrical and Electronics Engineers, Inc., pp. 286-291. ISBN 978-0-7695-3668-2. Fulltext restricted.

Lory, Peter (2009) Reducing the Complexity in the Distributed Computation of Private RSA Keys. In: Boyd, Colin and Nieto, Juan Gonzales, (eds.) Information Security and Privacy: Proceedings of the 14th Australasian Conference, ACISP 2009. Lecture Notes in Computer Science, 5594. Springer, Berlin, pp. 250-263. ISBN 3-642-02619-2. Fulltext restricted.

Lory, Peter (2008) Accelerating the Distributed Multiplication Protocol with Applications to the Distributed Miller-Rabin Primality Test. In: Breitner, Michael H. and Denk, Georg and Rentrop, Peter, (eds.) From Nano to Space: Applied Mathematics Inspired by Roland Bulirsch. Springer, Berlin, pp. 245-257. ISBN 978-3-540-74238-8. Fulltext not available.

Lory, Peter (2007) Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values. In: Proceedings of the 21st International Conference on Advanced Networking and Applications (AINA 2007), Symposium on Security in Networks and Distributed Systems (SSNDS-07). IEEE Computer Society, Los Alamitos, Calif., pp. 415-419. ISBN 0-7695-2847-3; 978-0-7695-2847-2.

Wölfl, Thomas (2005) Public-Key-Infrastructure Based on a Peer-to-Peer Network. In: Sprague, Ralph H., (ed.) Proceedings of the 38th Annual Hawaii International Conference on System Sciences: 3 - 6 January 2005, Big Island, Hawaii, [Hilton Waikoloa]; abstracts and CD-ROM of full papers. IEEE Computer Society, Los Alamitos, Calif., 200a. ISBN 0-7695-2268-8. Fulltext not available.

Wölfl, Thomas and Wünschmann, S. (2005) Public-Key-Infrastrukturen in einer Peer-to-Peer Umgebung. In: Cremers, Armin B. and Manthey, Rainer and Martini, Peter and Steinhage, Volker, (eds.) Informatik 2005 - Informatik LIVE! 19.-22. September 2005 in Bonn. Gesellschaft für Informatik, Bonn, pp. 643-647. Fulltext not available.

Dresp, Wiebke (2005) Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. In: Dittmann, Jana, (ed.) Communications and Multimedia Security. Lecture Notes in Computer Science, 3677. Springer, Berlin, pp. 230-239. ISBN 978-3-540-28791-9. Fulltext restricted.

Lory, Peter (2003) A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net. In: Aalst, Wil van der, (ed.) Business Process Management. Lecture Notes in Computer Science, 2678. Springer, Berlin, pp. 232-245. ISBN 978-3-540-40318-0. Fulltext restricted.

Lory, Peter (2003) A coloured Petri net trust model. In: Proceedings of the 14th International Workshop on Database and Expert Systems Applications. IEEE Computer Society, Los Alamitos, Calif., pp. 415-419. ISBN 0-7695-1993-8.

Lory, Peter and Dietl, D. (2000) Neural networks for two-group classification problems with monotonicity hints. In: Decker, Reinhold and Gaul, Wolfgang, (eds.) Classification and Information Processing at the Turn of the Millennium. Springer, Berlin, pp. 113-118. ISBN 3-540-67589-2.

Lory, Peter (1989) Numerical aspects of waveform relaxation. In: Dafermos, C. and Ladas, G. and Papanicolaou, G., (eds.) Differential Equations: Proceedings of the 1987 EQUADIFF-Conference. Marcel Dekker, New York, pp. 451-458. ISBN 0-8247-8077-9.

Monograph

Lory, Peter and Wenzl, Jürgen (2011) A Note on Secure Multiparty Multiplication. Working Paper, Regensburg.

Wenzl, Jürgen (2010) Laufzeitanalyse dreier Versionen eines Mehrparteien-Multiplikationsprotokolls. Regensburger Diskussionsbeiträge zur Wirtschaftswissenschaft 440, Working Paper, Regensburg.

Conference or workshop item

Lory, Peter (2012) Mehrparteienberechnungen und Tschebyscheff-Polynome. In: Konferenz "Cloud & Klein" - IT im Spannungsfeld zwischen Servercluster und Sensornetz, 26.04.2012, Wien.

Liedel, Manuel (2012) Secure Distributed Computation of the Square Root and Applications. In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), 9.4-12.4.2012, Hangzhou, China. (In Press)

Thesis of the University of Regensburg

Liedel, Manuel (2013) Sichere Mehrparteienberechnungen und datenschutzfreundliche Klassifikation auf Basis horizontal partitionierter Datenbanken. PhD, Universität Regensburg.

Dresp, Wiebke (2008) Verteiltes Datenverwaltungssystem für Authentifizierungs- und Autorisierungsinfrastrukturen: P2P-ZuSI. Formales Modell und Sicherheitsanalyse. PhD, Universität Regensburg.

This list was generated on Wed Nov 6 09:42:11 2024 CET.
  1. Homepage UR

University Library

Publication Server

Contact:

Publishing: oa@ur.de
0941 943 -4239 or -69394

Dissertations: dissertationen@ur.de
0941 943 -3904

Research data: datahub@ur.de
0941 943 -5707

Contact persons