References of "2015"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailPour une nouvelle dimension contractuelle et une personnalité morale non obligatoire en droit des sociétés
Corbisier, Isabelle UL

in Revue Pratique des Sociétés Civiles et Commerciales (2015), (3-4), 313-383

This text was originally presented at the International Symposium "Les journées juridiques Jean Dabin" at the Catholic University of Louvain in 1992

Detailed reference viewed: 149 (15 UL)
Full Text
Peer Reviewed
See detailDer Einfluss des Europäischen Wirtschaftsrechts auf das Deliktsrecht
Zetzsche, Dirk Andreas UL

in Zeitschrift für das allgemeine Handels- und Wirtschaftsrecht (ZHR) (2015), 4

Detailed reference viewed: 150 (5 UL)
See detailApprendre à négliger le mauvais côté des choses: La modification des biais cognitifs
Ceschi, Grazia; Heeren, Alexandre; Billieux, Joël UL et al

in Van der Linden, Martial; Ceschi, Grazia; Billieux, Joël (Eds.) Interventions psychologiques en psychopathologie cognitive (2015)

Detailed reference viewed: 141 (0 UL)
See detailL’entrainement attentionnel : Une technique transdiagnostique
Billieux, Joël UL; Ceschi, Grazia; Van der Linden, Martial

in Van der Linden, Martial; Ceschi, Grazia; Billieux, Joël (Eds.) Interventions psychologiques en psychopathologie cognitive (2015)

Detailed reference viewed: 138 (2 UL)
Peer Reviewed
See detailThe conceptualization and assessment of problematic mobile phone use
Lopez-Fernandez, Olatz; Kuss, Daria; Griffiths, Mark et al

in Yan, Z. (Ed.) Encyclopedia of Mobile Phone Behavior (Volumes 2) (2015)

Detailed reference viewed: 185 (1 UL)
Peer Reviewed
See detailImpulsivité
Billieux, Joël UL

in Seron, X.; Fayol, M. (Eds.) Encylopedia Universalis (section Psychologie) (2015)

Detailed reference viewed: 61 (0 UL)
See detailInter-regionalism through civil society participation
Velasco Pufleau, Monica UL

Presentation (2015)

Detailed reference viewed: 82 (12 UL)
Full Text
Peer Reviewed
See detailLes fondements de l’appel immédiat et la notion de principal
Menetrey, Séverine UL

in Pasicrisie Luxembourgeoise: Recueil Trimestriel de la Jurisprudence Luxembourgeoise (2015)

Detailed reference viewed: 118 (6 UL)
Full Text
See detailPolíticas de combate ao insucesso e abandono escolar numa perspetiva de género na União Europeia e Portugal - da inexistência à desarticulação
Guimarães, Paula; Marques, Marcelo UL

in Cavaco, Carmen; Alves, Natália; Guimarães, Feliciano (Eds.) Abandono e Insucesso Escolar - Construir uma Perspetiva de Género (2015)

Detailed reference viewed: 78 (1 UL)
Full Text
Peer Reviewed
See detailNo Place to Hide – Edward Snowden, the NSA and the Surveillance State
Giurgiu, Andra UL

in European Data Protection Law Review (2015), 1(3), 249-254

Detailed reference viewed: 265 (3 UL)
Full Text
See detailZur Problematik des generischen Maskulinums. Positionen und kritische Analyse
Sieburg, Heinz UL

in Sieburg, Heinz (Ed.) ‚Geschlecht‘ in Literatur und Geschichte. Bilder - Identitäten – Konstruktionen (2015)

Detailed reference viewed: 137 (8 UL)
Full Text
Peer Reviewed
See detailAssessment of modernized GPS L5 SNR for ground-based multipath reflectometry applications
Tabibi, Sajad UL; Nievinski, Felipe G.; van Dam, Tonie UL et al

in Advances in Space Research (2015), 55(4), 1104-1116

Detailed reference viewed: 248 (22 UL)
Full Text
Peer Reviewed
See detailSimulation-Based Secure Functional Encryption in the Random Oracle Model
Iovino, Vincenzo UL; Żebrowski, Karol

in Progress in Cryptology -- LATINCRYPT 2015 (2015)

One of the main lines of research in functional encryption (FE) has consisted in studying the security notions for FE and their achievability. This study was initiated by [Boneh et al. – TCC’11, O’Neill – ... [more ▼]

One of the main lines of research in functional encryption (FE) has consisted in studying the security notions for FE and their achievability. This study was initiated by [Boneh et al. – TCC’11, O’Neill – ePrint’10] where it was first shown that for FE the indistinguishability-based (IND) security notion is not sufficient in the sense that there are FE schemes that are provably IND-Secure but concretely insecure. For this reason, researchers investigated the achievability of Simulation-based (SIM) security, a stronger notion of security. Unfortunately, the above-mentioned works and others [e.g., Agrawal et al. – CRYPTO’13] have shown strong impossibility results for SIM-Security. One way to overcome these impossibility results was first suggested in the work of Boneh et al. where it was shown how to construct, in the Random Oracle (RO) model, SIM-Secure FE for restricted functionalities and was asked the generalization to more complex functionalities as a challenging problem in the area. Subsequently, [De Caro et al. – CRYPTO’13] proposed a candidate construction of SIM-Secure FE for all circuits in the RO model assuming the existence of an IND-Secure FE scheme for circuits with RO gates. To our knowledge there are no proposed candidate IND-Secure FE schemes for circuits with RO gates and they seem unlikely to exist. We propose the first constructions of SIM-Secure FE schemes in the RO model that overcome the current impossibility results in different settings. We can do that because we resort to the two following models: In the public-key setting we assume a bound on the number of queries but this bound only affects the running-times of our encryption and decryption procedures. We stress that our FE schemes in this model are SIM-Secure and have ciphertexts and tokens of constant-size, whereas in the standard model, the current SIM-Secure FE schemes for general functionalities [De Caro et al., Gorbunov et al. – CRYPTO’12] have ciphertexts and tokens of size growing as the number of queries. In the symmetric-key setting we assume a timestamp on both ciphertexts and tokens. In this model, we provide FE schemes with short ciphertexts and tokens that are SIM-Secure against adversaries asking an unbounded number of queries. Both results also assume the RO model, but not functionalities with RO gates and rely on extractability obfuscation [Boyle et al. – TCC’14] (and other standard primitives) secure only in the standard model. [less ▲]

Detailed reference viewed: 282 (5 UL)
Full Text
Peer Reviewed
See detail3D real-time human action recognition using a spline interpolation approach
Ghorbel, Enjie UL; Boutteau, Rémi; Boonaert, Jacques et al

in 2015 International Conference on Image Processing Theory, Tools and Applications (IPTA) (2015)

Detailed reference viewed: 104 (1 UL)
Full Text
Peer Reviewed
See detailValidation d'un Nouveau Modèle Statistique de Scapula Augmenté de Marqueurs Anatomiques
Borotikar, Bhushan; Ghorbel, Enjie UL; Mutsvangwa, Tinashe et al

in TAIMA 2015: Traitement et Analyse de l'Information: Méthodes et Applications (2015)

Detailed reference viewed: 45 (2 UL)
See detailExécution au Luxembourg d'une sentence arbitrale annulée dans son Etat d'origine : note sous CA Luxembourg, 25 juin 2015
Cuniberti, Gilles UL

in Pasicrisie Luxembourgeoise: Recueil Trimestriel de la Jurisprudence Luxembourgeoise (2015)

Exécution au Luxembourg d’une sentence arbitrale soumise à un recours en annulation au pays du siège.

Detailed reference viewed: 106 (4 UL)
Full Text
Peer Reviewed
See detail3D detection of damage evolution in porous brittle cement or plaster based materials
Nguyen, Thanh Tung UL; Bornert, M.; Chateau, C. et al

in International Conference on Tomography of Materials and Structures (2015)

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailPhase field modelling of complex microcracking in voxel-based models of cementitious materials
Nguyen, Thanh Tung UL; Yvonnet, J.; Zhu, Q.-Z. et al

in 13th U.S. National Congress on Computational Mechanics (2015)

Detailed reference viewed: 32 (0 UL)