TY - CHAP A1 - Bäcker, Matthias A1 - Schusser, Sebastian A1 - Leinhos, Marcel A1 - Poghossian, Arshak A1 - Schöning, Michael Josef T1 - Sensor system for the monitoring of degradation processes of biodegradable biopolymers T2 - Sensoren und Messsysteme 2014 ; Beiträge der 17. GMA/ITG-Fachtagung vom 3. bis 4. Juni 2014 in Nürnberg. (ITG-Fachbericht ; 250) Y1 - 2014 SN - 978-3-8007-3622-5 SP - 1 EP - 4 PB - VDE-Verl. CY - Düsseldorf ER - TY - CHAP A1 - Werner, Frederik A1 - Yoshinobu, T. A1 - Miyamoto, K. A1 - Schöning, Michael Josef A1 - Wagner, Torsten T1 - Semiconductor-based sensors for imaging of chemical processes T2 - Sensoren und Messsysteme 2014 ; Beiträge der 17. GMA/ITG-Fachtagung vom 3. bis 4. Juni 2014 in Nürnberg. (ITG-Fachbericht ; 250) Y1 - 2014 SN - 978-3-8007-3622-5 SP - 1 EP - 5 PB - VDE-Verl. CY - Düsseldorf ER - TY - CHAP A1 - Rosin, Julia A1 - Butenweg, Christoph T1 - Seismic isolation of cylindrical liquid storage tanks T2 - Proceedings of the 9th European Conference on Structural Dynamics, EURODYN 2014 Porto, Portugal, 30 June - 2 July 2014 / A. Cunha, E. Caetano, .... (eds.) Y1 - 2014 SN - 978-972-752-165-4 SP - 3145 EP - 3152 CY - Porto ER - TY - CHAP A1 - Butenweg, Christoph A1 - Holtschoppen, Britta T1 - Seismic design of industrial facilities in Germany T2 - Seismic Design of Industrial Facilities : proceedings of the International Conference on Seismic Design of Industrial Facilities (SeDIF-Conference) : Aachen, 26. - 27.9.2013 Y1 - 2014 SN - 978-3-658-02809-1 ; 3-658-02809-2 (Print) ; 978-3-658-02810-7 (E-Book) U6 - http://dx.doi.org/10.1007/978-3-658-02810-7_6 SP - 63 EP - 74 PB - Springer Vieweg CY - Wiesbaden ER - TY - CHAP A1 - Rosin, Julia A1 - Kubalski, Thomas A1 - Butenweg, Christoph T1 - Seismic Design of cylindrical liquid storage tanks T2 - Seismic design of industrial facilities : proceedings of the International Conference on Seismic Design of Industrial Facilities (SeDIF-Conference) ; [Aachen, 26. - 27. September 2013] / Chair of Structural Statics and Dynamics, RWTH Aachen. Sven Klinkel ..., ed. Y1 - 2014 SN - 978-3-658-02810-7 (E-Book) ; 978-3-658-02809-1 (Print) U6 - http://dx.doi.org/10.1007/978-3-658-02810-7_36 SP - 429 EP - 440 PB - Springer Vieweg CY - Wiesbaden ER - TY - CHAP A1 - Göttsche, Joachim A1 - Röther, Sascha T1 - Science College Overbach - Innovatives Bildungszentrum in Jülich-Barmen T2 - 18. Internationale Passivhaustagung, Aachen, April 2014 N2 - Preprint der Autoren Y1 - 2014 ER - TY - CHAP A1 - Kern, Alexander A1 - Braun, Christian T1 - Risk management according to IEC 62305-2 edition 2: 2010–12 assessment of structures with a risk of explosion T2 - 2014 International Conference on Lightning Protection (ICLP), Shanghai, China N2 - Risk management for structures with a risk of explosion should be considered very carefully when performing a risk analysis according to IEC 62305-2. In contrast to the 2006 edition of the standard, the 2010 edition describes the topic “Structures with a risk of explosion” in more detail. Moreover, in Germany separate procedures and parameters are defined for the risk analysis of structures with a risk of explosion (Supplement 3 of the German DIN EN 62305-2 standard). This paper describes the contents and the relevant calculations of this Supplement 3, together with a numerical example. Y1 - 2014 SP - 1237 EP - 1242 ER - TY - CHAP A1 - Neugebauer, Georg A1 - Brutschy, Lucas A1 - Meyer, Ulrike A1 - Wetzel, Susanne ED - Garcia-Alfaro, Joaquin ED - Lioudakis, Georgios ED - Cuppens-Boulahia, Nora ED - Foley, Simon ED - Fitzgerald, William M. T1 - Privacy-preserving multi-party reconciliation secure in the malicious model T2 - DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security N2 - The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case. KW - Privacy-enhancing technologies KW - Secure multi-party computation KW - Cryptographic protocols KW - Zero-knowledge proofs KW - Malicious model Y1 - 2014 SN - 978-3-642-54567-2 (Print) SN - 978-3-642-54568-9 (Online) U6 - http://dx.doi.org/10.1007/978-3-642-54568-9_12 N1 - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013. Part of the Lecture Notes in Computer Science book series (LNSC,volume 8247) SP - 178 EP - 193 PB - Springer CY - Berlin ER - TY - CHAP A1 - Hüning, Felix T1 - Power semiconductors : key components for HEV/EV T2 - FISITA 2014 World Automotive Congress : 2 - 6 June, Maastricht, the Netherlands International Federation of Automotive Engineering Societies Y1 - 2014 N1 - Datenformat: PDF PB - KIVI CY - [s.l.] ER - TY - CHAP A1 - Anthrakidis, Anette A1 - Herrmann, Ulf A1 - Mirza, M. F. A1 - Schorn, Christian A1 - Schwarzer, Klemens A1 - Wedding, Philipp A1 - Weis, Fabian T1 - Parabolrinnenentwicklung und Qualifizierung am Solar-Institut Jülich T2 - Thermische Solarenergie : 24. Symposium ; 7. bis 9. Mai 2014, Kloster Banz, Bad Staffelstein Y1 - 2014 SN - 978-3-943891-35-5 SP - 242 EP - 243 PB - OTTI CY - Regensburg ER -