TY - CHAP A1 - Edip, Kemal A1 - Garevski, Mihail A1 - Butenweg, Christoph A1 - Sesov, Vlatko A1 - Bojadjieva, Julijana A1 - Gjorgjiev, Igor T1 - Boundary effects on seismic analysis of multi-storey frames considering soil structure interaction phenomenon T2 - Seismic design of industrial facilities : proceedings of the International Conference on Seismic Design of Industrial Facilities (SeDIF-Conference) ; [Aachen, 26. - 27. September 2013] / Chair of Structural Statics and Dynamics, RWTH Aachen. Sven Klinkel ..., ed Y1 - 2014 SN - 978-3-658-02809-1 (Print) ; 978-3-658-02810-7 U6 - https://doi.org/10.1007/978-3-658-02810-7_47 SP - 569 EP - 576 PB - Springer Vieweg CY - Wiesbaden ER - TY - CHAP A1 - Giresini, Linda A1 - Butenweg, Christoph A1 - Andreini, M. A1 - De Falco, A. A1 - Sassu, M. T1 - Numerical calibration of a macro-element for vaultes system in historic churches T2 - 9th International Conference on Structural Analyses of Historical Conctruction, 14 - 17 October, 2014, Mexico City Y1 - 2014 SP - 1 EP - 12 ER - TY - CHAP A1 - Rosin, Julia A1 - Butenweg, Christoph T1 - Seismic isolation of cylindrical liquid storage tanks T2 - Proceedings of the 9th European Conference on Structural Dynamics, EURODYN 2014 Porto, Portugal, 30 June - 2 July 2014 / A. Cunha, E. Caetano, .... (eds.) Y1 - 2014 SN - 978-972-752-165-4 SP - 3145 EP - 3152 CY - Porto ER - TY - CHAP A1 - Butenweg, Christoph A1 - Rajan, Sreelakshmy T1 - Design and construction techniques of AAC masonry buildings in earthquakes regions T2 - 10 years Xella research in Building Materials : Symposium on the 4th and 5th of September, Potsdam 2014 Y1 - 2014 ER - TY - CHAP A1 - Jung, Alexander A1 - Staat, Manfred A1 - Müller, Wolfram ED - Onate, E. T1 - Optimization of the flight style in ski jumping T2 - 11th World Congress on Computational Mechanics (WCCM XI) ; 5th European Conference on Computational Mechanics (ECCM V) ; 6th European Conference on Computational Fluid Dynamics (ECFD VI) ; July 20 - 25, 2014, Barcelona Y1 - 2014 N1 - Das Paper wurde nach der Konferenz überarbeitet. SP - 799 EP - 810 ER - TY - CHAP A1 - Butenweg, Christoph A1 - Meyer, Udo A1 - Fehling, Ekkehard T1 - INSYSME: first activities of the German partners T2 - 9th International Masonry Conference 2014 in Guimaraes, Portugal, 2014 Y1 - 2014 ER - TY - CHAP A1 - Heuermann, Holger A1 - Finger, Torsten T1 - 2.45 GHz Plasma Powered Spark Plug by Thermal and EM-Optimization Y1 - 2014 N1 - Ansys High Frequency Simulation Conference - AHFSC 2014, Munich; 02/2014 ER - TY - CHAP A1 - Schopp, Christoph A1 - Heuermann, Holger A1 - Holtrup, S. T1 - Investigation on efficacy optimization of RF-driven automotive D-lamps T2 - 44th European Microwave Conference (EuMC),2014, Rome Y1 - 2014 U6 - https://doi.org/10.1109/EuMC.2014.6986645 SP - 1154 EP - 1157 ER - TY - CHAP A1 - Neumann, Tobias A1 - Ferrein, Alexander A1 - Kallweit, Stephan A1 - Scholl, Ingrid T1 - Towards a mobile mapping robot for underground mines T2 - 7th Conference of Robotics and Mechatronics : RobMech 2014 : 27th and 28th Nov. 2014, Cape Town Y1 - 2014 SP - 1 EP - 6 ER - TY - CHAP A1 - Neugebauer, Georg A1 - Brutschy, Lucas A1 - Meyer, Ulrike A1 - Wetzel, Susanne ED - Garcia-Alfaro, Joaquin ED - Lioudakis, Georgios ED - Cuppens-Boulahia, Nora ED - Foley, Simon ED - Fitzgerald, William M. T1 - Privacy-preserving multi-party reconciliation secure in the malicious model T2 - DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security N2 - The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case. KW - Privacy-enhancing technologies KW - Secure multi-party computation KW - Cryptographic protocols KW - Zero-knowledge proofs KW - Malicious model Y1 - 2014 SN - 978-3-642-54567-2 (Print) SN - 978-3-642-54568-9 (Online) U6 - https://doi.org/10.1007/978-3-642-54568-9_12 N1 - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013. Part of the Lecture Notes in Computer Science book series (LNSC,volume 8247) SP - 178 EP - 193 PB - Springer CY - Berlin ER -