TY - CHAP A1 - Heuermann, Holger A1 - Finger, Torsten T1 - 2.45 GHz Plasma Powered Spark Plug by Thermal and EM-Optimization Y1 - 2014 N1 - Ansys High Frequency Simulation Conference - AHFSC 2014, Munich; 02/2014 ER - TY - CHAP A1 - Al-Kaidy, H. A1 - Ulber, Roland A1 - Tippkötter, Nils T1 - A platform technology for the automated reaction control in magnetizable micro-fluidic droplets T2 - Biomaterials - made in bioreactors : book of abstracts, May 26 - 28, 2014, Radisson Blu Park Hotel and Conference Dentre, Radebeul, Germany Y1 - 2014 SP - 21 EP - 22 PB - DECHEMA CY - Frankfurt am Main ER - TY - CHAP A1 - Schopp, Christoph A1 - Heuermann, Holger A1 - Holtrup, S. T1 - Investigation on efficacy optimization of RF-driven automotive D-lamps T2 - 44th European Microwave Conference (EuMC),2014, Rome Y1 - 2014 U6 - https://doi.org/10.1109/EuMC.2014.6986645 SP - 1154 EP - 1157 ER - TY - CHAP A1 - Neumann, Tobias A1 - Ferrein, Alexander A1 - Kallweit, Stephan A1 - Scholl, Ingrid T1 - Towards a mobile mapping robot for underground mines T2 - 7th Conference of Robotics and Mechatronics : RobMech 2014 : 27th and 28th Nov. 2014, Cape Town Y1 - 2014 SP - 1 EP - 6 ER - TY - CHAP A1 - Neugebauer, Georg A1 - Brutschy, Lucas A1 - Meyer, Ulrike A1 - Wetzel, Susanne ED - Garcia-Alfaro, Joaquin ED - Lioudakis, Georgios ED - Cuppens-Boulahia, Nora ED - Foley, Simon ED - Fitzgerald, William M. T1 - Privacy-preserving multi-party reconciliation secure in the malicious model T2 - DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security N2 - The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case. KW - Privacy-enhancing technologies KW - Secure multi-party computation KW - Cryptographic protocols KW - Zero-knowledge proofs KW - Malicious model Y1 - 2014 SN - 978-3-642-54567-2 (Print) SN - 978-3-642-54568-9 (Online) U6 - https://doi.org/10.1007/978-3-642-54568-9_12 N1 - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013. Part of the Lecture Notes in Computer Science book series (LNSC,volume 8247) SP - 178 EP - 193 PB - Springer CY - Berlin ER - TY - CHAP A1 - Bung, Daniel Bernhard T1 - Observations on non-aerated flow and air entrainment on moderately sloped stepped spillways T2 - 7th Chinese-German Joint Symposium on Hydraulic and Ocean Engineering : 8. - 12. Sept. 2014, Hannover Y1 - 2014 N1 - Kennwortgeschützter Zugang. Passwort bei Prof. Bung, Fachbereich Bauingenieurwesen SP - 1 EP - 8 ER - TY - CHAP A1 - Bung, Daniel Bernhard A1 - Oertel, Mario T1 - Manipulation of non-aerated cavity flow on a stepped spillway model T2 - 3rd European IAHR Congress : April 14 – 16, 2014, Porto Y1 - 2014 PB - Univ. of Porto CY - Porto ER -