Sachar Paulus

According to our database1, Sachar Paulus authored at least 33 papers between 1994 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Ubiquitous Learning Applied to Coding: A set of tools and services to deliver code-intensive learning contexts to student devices.
Proceedings of the 3rd European Conference of Software Engineering Education, 2018

Sichere Software im Umfeld von Industrie 4.0.
Proceedings of the Digitalisierung im Spannungsfeld von Politik, 2018

2015
Evidence-Based Trustworthiness of Internet-Based Services Through Controlled Software Development.
Proceedings of the Cyber Security and Privacy, 2015

Extending Software Development Methodologies to Support Trustworthiness-by-Design.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

2014
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract).
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
An approach for a business-driven cloudcompliance analysis covering public sector process improvement requirements.
CoRR, 2013

Trustworthy Software Development.
Proceedings of the Communications and Multimedia Security, 2013

Trustworthiness Attributes and Metrics for Engineering Trusted Internet-Based Software Systems.
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013

An Analysis of Software Quality Attributes and Their Contribution to Trustworthiness.
Proceedings of the CLOSER 2013, 2013

2012
Geeignete Anforderungen für sichere Software.
Datenschutz und Datensicherheit, 2012

Software-Integrität - geht das? - Vertraulichkeit und Integrität von Informationen durch sichere Software.
Datenschutz und Datensicherheit, 2012

2011
Standards für Trusted Clouds - Anforderungen an Standards und aktuelle Entwicklungen.
Datenschutz und Datensicherheit, 2011

2010
OpeneGK - Benutzerfreundliche und sichere Authentisierung für Mehrwertdienste im Gesundheitswesen.
Proceedings of the perspeGKtive 2010, 2010

2007
PKI als Grundlage für SOA - Service-Vertrauensmanagement ist nur mit PKI in den Griff zu bekommen.
Datenschutz und Datensicherheit, 2007

EKIAS - Success Criteria of PKI Implementations.
Proceedings of the ISSE/SECURE 2007, 2007

2006
10 Prinzipien für sichere Software - Prozess-Orientierte Best Practices als Selbstverantwortung für Software-Hersteller.
Datenschutz und Datensicherheit, 2006

2005
Sieving in Function Fields.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
Des. Codes Cryptogr., 2004

2003
Nützliche neue Impulse?
Datenschutz und Datensicherheit, 2003

Identity Management und die Integration in Anwendungen.
Datenschutz und Datensicherheit, 2003

2001
Rundum-sorglos-Paket mit Hindernissen - Trust Center Services im Blickfeld.
Datenschutz und Datensicherheit, 2001

2000
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time.
J. Cryptol., 2000

On the Implementation of Cryptosystems Based on Real Quadratic Number Fields.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

1999
Real and imaginary quadratic representations of hyperelliptic function fields.
Math. Comput., 1999

Sieving in Function Fields.
Exp. Math., 1999

NICE - New Ideal Coset Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

1998
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Comparing Real and Imaginary Arithmetics for Divisor Class Groups of Hyperelliptic Curves.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

Lattice Basis Reduction in Function Fields.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

1997
A One Way Function Based on Ideal Arithmetic in Number Fields.
Proceedings of the Advances in Cryptology, 1997

1996
An Algorithm of Subexponential Type Computing the Class Group of Quadratic Orders over Principal Ideal Domains.
Proceedings of the Algorithmic Number Theory, Second International Symposium, 1996

1994
Algorithms for CM-fields.
Proceedings of the Algorithmic Number Theory, First International Symposium, 1994


  Loading...