Publikationen
Publikationen
A Selection of Recent lattice-Based Signature and Encryption Schemes
Bansarkhani, Rachid El; Cabarcas, Daniel; Kuo, Po-Chun; Schmidt, Patrick; Schneider, Michael
Tatra Mountains Mathematical Publications, p.81-102
[Journal Article]
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication
Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Sadeghi, Ahmad-Reza
BlackHat Abu Dhabi
[Conference Proceedings]
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen
Braun, Johannes; Hülsing, Andreas; Wiesmaier, Alexander
[Report]
Secure Long-Term Record Keeping in the Public Sector
Langer, L.; Wiesmaier, A.; Buchmann, J.
eGovernment Review (Journal), Vol.7, p.14-15
[Journal Article]
Mobile eID application for the German identity card
Horsch, M.; Braun, J.; Wiesmaier, A.
[Report]
Der elektronische Safe als vertrauenswürdiger Cloud Service
Klieme, E.; Strick, L.; Wunderlich, W.; Braun, J.; Wiesmaier, A.
[Report]
Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
[Conference Proceedings]
An efficient mobile PACE implementation
Wiesmaier, A.; Horsch, M.; Braun, J.; Kiefer, F.; Hühnlein, D.; Strenzke, F.; Buchmann, J.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176-185
[Conference Proceedings]
In-packet Bloom filters: Design and networking applications
Esteve, C.; Macapuna, C.; Magalhaes, M.; Verdi, F.; Wiesmaier, A.
Computer Networks (Journal), Vol.55, p.1364-1378
[Journal Article]
Mobile Authentisierung und Signatur
Braun, J.; Horsch, M.; Wiesmaier, A.; Hühnlein, D.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32-43
[Conference Proceedings]
AmazonIA: When Elasticity Snaps Back
Bugiel, Sven; Pöppelmann, Thomas; Nürnberger, Stefan; Sadeghi, Ahmad-Reza; Schneider, Thomas
CCS '11: Proceedings of the 18th ACM conference on Computer and communications security, p.389-400
[Conference Proceedings]
Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
[Conference Proceedings]
Cryptographic Application Scenarios
Karatsiolis, E.; Langer, L.; Schmidt, A.; Tews, E.; Wiesmaier, A.
[Report]
Eine kurze Geschichte der Schlüssel
Buchmann, J.; Wiesmaier, A.
360$^\circ$ — Fachmagazin für das Management im öffentlichen Sektor (Journal), Vol.17, p.21-23
[Journal Article]
Innovative Personalausweisanwendungen — Mehrwert des elektronischen Personalausweises jenseits von Portal- und Formularanwendungen
Langer, L.; Schmidt, A.; Wiesmaier, A.
[Report]
Towards a mobile eCard Client
Buchmann, J.; Wiesmaier, A.; Hühnlein, D.; Braun, J.; Horsch, M.; Kiefer, F.; Strenzke, F.
Tagungsband zum 13. KryptoTag, p.4
[Conference Proceedings]
Der Lifetime eSafe — ein sicheres elektronisches Schließfach
Langer, L.; Wiesmaier, A.
Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), p.155
[Conference Proceedings]
Langfristige Sicherheit am Beispiel eines virtuellen Tresors
Langer, L.; Wiesmaier, A.
[Report]
Projekt Campuspilot — Akzeptanzbericht
Langer, L.; Schmidt, A.; Wiesmaier, A.
[Report]
From Student Smartcard Applications to the German Electronic Identity Card
Langer, L.; Schmidt, A.; Wiesmaier, A.
9th European Conference on e-Government — ECEG, p.430-435
[Conference Proceedings]
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
Hühnlein, D.; Korte, U.; Langer, L.; Wiesmaier, A.
3rd International Conference on New Technologies, Mobility and Security (NTMS), p.1-5
[Conference Proceedings]
MAVA — Modular Security for Distributed Applications
Rexroth, P.; Wiesmaier, A.
[Report]
The State of the Art in Algorithmic Encryption
Wiesmaier, A.
[Report]
The T-Vote Protocol
Araújo, R.; Wiesmaier, A.; Buchmann, J.
[Report]
Intrinsically Legal-For-Trade Objects by Digital Signatures
Wiesmaier, A.; Rauchschwalbe, U.; Ludwig, C.; Henhapl, B.; Ruppert, M.; Buchmann, J.
Sicherheit 2006: Sicherheit — Schutz und Zuverlässigkeit, p.218-221
[Conference Proceedings]
Digital signierte Wägeresultate — Neue Wege in der Sicherung eichfähiger Messwerte
Rauchschwalbe, U.; Wiesmaier, A.; Ludwig, C.; Buchmann, J.
WDM — Wägen, Dosieren + Mischen (Journal), Vol.3, p.23-27
[Journal Article]
An Electronic Scheme for the Farnel Paper-Based Voting Protocol
Araújo, R.; Custodio, R.; Wiesmaier, A.; Takagi, T.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.78-91
[Conference Proceedings]
On Firewalls and Tunneling
Frommer, J.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.190-205
[Conference Proceedings]
On Securing Unix Systems with Smart Cards
große Osterhues, D.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.143-157
[Conference Proceedings]
The State of the Art in DNS Spoofing
Steinhoff, U.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06)
[Conference Proceedings]