default search action
Sachar Paulus
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c18]Sachar Paulus, Thomas Smits, Tobias Becht, Serife Kol:
Ubiquitous Learning Applied to Coding: A set of tools and services to deliver code-intensive learning contexts to student devices. ECSEE 2018: 87-92 - [p1]Sachar Paulus:
Sichere Software im Umfeld von Industrie 4.0. Digitalisierung im Spannungsfeld von Politik, Wirtschaft, Wissenschaft und Recht (2) 2018: 185-194 - 2015
- [c17]Nazila Gol Mohammadi, Torsten Bandyszak, Sachar Paulus, Per Håkon Meland, Thorsten Weyer, Klaus Pohl:
Extending Software Development Methodologies to Support Trustworthiness-by-Design. CAiSE Forum 2015: 213-220 - [c16]Francesco Di Cerbo, Nazila Gol Mohammadi, Sachar Paulus:
Evidence-Based Trustworthiness of Internet-Based Services Through Controlled Software Development. CSP Forum 2015: 91-102 - 2014
- [c15]Nazila Gol Mohammadi, Torsten Bandyszak, Sachar Paulus, Per Håkon Meland, Thorsten Weyer, Klaus Pohl:
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract). TRUST 2014: 206-207 - 2013
- [c14]Nazila Gol Mohammadi, Sachar Paulus, Mohamed Bishr, Andreas Metzger, Holger Könnecke, Sandro Hartenstein, Thorsten Weyer, Klaus Pohl:
Trustworthiness Attributes and Metrics for Engineering Trusted Internet-Based Software Systems. CLOSER (Selected Papers) 2013: 19-35 - [c13]Nazila Gol Mohammadi, Sachar Paulus, Mohamed Bishr, Andreas Metzger, Holger Koennecke, Sandro Hartenstein, Klaus Pohl:
An Analysis of Software Quality Attributes and Their Contribution to Trustworthiness. CLOSER 2013: 542-552 - [c12]Sachar Paulus, Nazila Gol Mohammadi, Thorsten Weyer:
Trustworthy Software Development. Communications and Multimedia Security 2013: 233-247 - [i1]Sachar Paulus, Ute Riemann:
An approach for a business-driven cloudcompliance analysis covering public sector process improvement requirements. CoRR abs/1310.2832 (2013) - 2012
- [j12]Sachar Paulus:
Software-Integrität - geht das? - Vertraulichkeit und Integrität von Informationen durch sichere Software. Datenschutz und Datensicherheit 36(6): 413-418 (2012) - [j11]Sachar Paulus:
Geeignete Anforderungen für sichere Software. Datenschutz und Datensicherheit 36(11): 814-816 (2012) - 2011
- [j10]Sachar Paulus:
Standards für Trusted Clouds - Anforderungen an Standards und aktuelle Entwicklungen. Datenschutz und Datensicherheit 35(5): 317-321 (2011) - 2010
- [c11]Daniel Eske, Detlef Hühnlein, Sachar Paulus, Johannes Schmölz, Tobias Wich, Thomas Wieland:
OpeneGK - Benutzerfreundliche und sichere Authentisierung für Mehrwertdienste im Gesundheitswesen. perspeGKtive 2010: 83-102
2000 – 2009
- 2007
- [j9]Sachar Paulus:
PKI als Grundlage für SOA - Service-Vertrauensmanagement ist nur mit PKI in den Griff zu bekommen. Datenschutz und Datensicherheit 31(9): 676-680 (2007) - [c10]Anja Beyer, Sophie Hellmann, Malte Hesse, Friedrich Holl, Peter Morcinek, Sachar Paulus, Helmut Reimer:
EKIAS - Success Criteria of PKI Implementations. ISSE 2007: 340-346 - 2006
- [j8]Sachar Paulus, Andreas Tegge:
10 Prinzipien für sichere Software - Prozess-Orientierte Best Practices als Selbstverantwortung für Software-Hersteller. Datenschutz und Datensicherheit 30(10): 623-626 (2006) - [e2]Sachar Paulus, Norbert Pohlmann, Helmut Reimer:
ISSE 2006 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2006 Conference, 10-12 October 2006, Rome, Italy. Vieweg 2006, ISBN 978-3-8348-0213-2 [contents] - 2005
- [r1]Sachar Paulus:
Sieving in Function Fields. Encyclopedia of Cryptography and Security 2005 - 2004
- [j7]Ingrid Biehl, Sachar Paulus, Tsuyoshi Takagi:
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders. Des. Codes Cryptogr. 31(2): 99-123 (2004) - [e1]Sachar Paulus, Norbert Pohlmann, Helmut Reimer:
ISSE 2004 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2004 Conference, Berlin, Germany, September 28-30, 2004. Vieweg+Teubner 2004, ISBN 978-3-528-05910-1 [contents] - 2003
- [j6]Cristina Buchholz, Sachar Paulus:
Identity Management und die Integration in Anwendungen. Datenschutz und Datensicherheit 27(9) (2003) - [j5]Sachar Paulus, Helmut Reimer:
Nützliche neue Impulse? Datenschutz und Datensicherheit 27(9) (2003) - 2001
- [j4]Sachar Paulus:
Rundum-sorglos-Paket mit Hindernissen - Trust Center Services im Blickfeld. Datenschutz und Datensicherheit 25(9) (2001) - 2000
- [j3]Sachar Paulus, Tsuyoshi Takagi:
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time. J. Cryptol. 13(2): 263-272 (2000) - [c9]Detlef Hühnlein, Sachar Paulus:
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields. Selected Areas in Cryptography 2000: 288-302
1990 – 1999
- 1999
- [j2]Ralf Flassenberg, Sachar Paulus:
Sieving in Function Fields. Exp. Math. 8(4): 339-349 (1999) - [j1]Sachar Paulus, Hans-Georg Rück:
Real and imaginary quadratic representations of hyperelliptic function fields. Math. Comput. 68(227): 1233-1241 (1999) - [c8]Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi:
NICE - New Ideal Coset Encryption. CHES 1999: 328-339 - 1998
- [c7]Sachar Paulus:
Lattice Basis Reduction in Function Fields. ANTS 1998: 567-575 - [c6]Sachar Paulus, Andreas Stein:
Comparing Real and Imaginary Arithmetics for Divisor Class Groups of Hyperelliptic Curves. ANTS 1998: 576-591 - [c5]Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi:
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. EUROCRYPT 1998: 294-307 - [c4]Sachar Paulus, Tsuyoshi Takagi:
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. ICISC 1998: 211-220 - 1997
- [c3]Johannes Buchmann, Sachar Paulus:
A One Way Function Based on Ideal Arithmetic in Number Fields. CRYPTO 1997: 385-394 - 1996
- [c2]Sachar Paulus:
An Algorithm of Subexponential Type Computing the Class Group of Quadratic Orders over Principal Ideal Domains. ANTS 1996: 243-257 - 1994
- [c1]Sachar Paulus:
Algorithms for CM-fields. ANTS 1994: 42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint