Publications
Publications
Multi-biometric continuous authentication: A trust model for an asynchronous system
Damer, N.; Maul, F.; Busch, C.
2016 19th Intl. Conf. on Information Fusion (FUSION), p.2192-2199
[Conference Proceedings]
A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes
Buchmann, N.; Rathgeb, C.; Wagner, J.; Busch, C.; Baier, H.
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]
BIOSIG 2016
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
Stream ciphers in the IoT: Grain and Trivium
Diedrich, L.; Murati, L.; Wiesmaier, A.
[Report]
Comparing Lightweight Hash Functions — PHOTON \& Quark
Schmidt, L.; Meuser, T.; Wiesmaier, A.
[Report]
Block ciphers PRESENT and SEA in comparison
Kußmaul, T.; Löffer, J.; Wiesmaier, A.
[Report]
IoT: Challenges, Projects, Architectures
Gazis, V.; Görtz, M.; Huber, M.; Leonardi, A.; Mathioudakis, K.; Wiesmaier, A.; Zeiger, F.
18th International Conference on Intelligence in Next Generation Networks (ICIN), p.145-147
[Conference Proceedings]
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, M.; Buchmann, J.; Cabarcas, D.; Weinert, C.; Wiesmaier, A.
Computer \& Security (Journal), Vol.50, p.16-32
[Journal Article]
Security Perspectives for Collaborative Data Acquisition in the Internet of Things
Gazis, V.; Cordero, C. Garcia; Vasilomanolakis, E.; Kikiras, P.; Wiesmaier, A.
Internet of Things. IoT Infrastructures — IoT360 / SaSeIoT 2014, p.271-282
A View on Privacy \& Trust in IoT
Daubert, J.; Wiesmaier, A.; Kikiras, P.
IEEE ICC 2015 — First Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (SPIC), p.2665-2670
[Conference Proceedings]
A Survey of Technologies for the Internet of Things
Gazis, V.; Görtz, M.; Huber, M.; Leonardi, A.; Mathioudakis, K.; Wiesmaier, A.; Zeiger, F.; Vasilomanolakis, E.
2015 International Wireless Communications \& Mobile Computing Conference (IWCMC), p.1090-1095
[Conference Proceedings]
Decision-making criteria for cyber security adoption: Internet of Things privacy and cyber security issues
Lukavchenko, A.; Rajasekaran, H.; Wiesmaier, A.; P. Kikiras, Panayotis Kikiras
10th Future Security Conference 2015 (Future Security 2015), p.245-252
[Conference Proceedings]
End-2-End Privacy Architecture for IoT
Funke, S.; Daubert, J.; Wiesmaier, A.; Kikiras, P.; Mühlhäuser, M.
Third IEEE Conference on Communications and Network Security (CNS 2015), p.705-706
[Conference Proceedings]
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
Datenschutz und Datensicherheit, Vol.39, p.383-387
[Journal Article]
Towards Bloom Filter-based Indexing of Iris Biometric Data
Rathgeb, C.; Breitinger, F.; Baier, H.; Busch, C.
2015 Intl. Conf. on Biometrics (ICB), p.1-8
[Conference Proceedings]
Long term confidentiality: a survey
Braun, J.; Buchmann, J.; Mullan, C.; Wiesmaier, A.
Designs, Codes and Cryptography (Journal), Vol.71, p.459-478
[Journal Article]
Towards the Smart Grid: Substation Automation Architecture and Technologies
Leonardi, A.; Mathioudakis, K.; Wiesmaier, A.; Zeiger, F.
Advances in Electrical Engineering (Journal), Vol.Article ID 896296
[Journal Article]
Security framework — Guidelines for trust services providers — Part 1
Barreira, I.; Gustavsson, T.; Wiesmaier, A.; Galan, C.; Gorniak, S.
Risk assessment — Guidelines for trust services providers — Part 2
Barreira, I.; Gustavsson, T.; Wiesmaier, A.; Galan, C.; Gorniak, S.
Mitigating the impact of security incidents — Guidelines for trust services providers — Part 3
Barreira, I.; Gustavsson, T.; Wiesmaier, A.; Galan, C.; Gorniak, S.
Introduction to Public Key Infrastructures
Buchmann, J.; Karatsiolis, E.; Wiesmaier, A.
[Book]
How to Avoid the Breakdown of Public Key Infrastructures — Forward Secure Signatures for Certificate Authorities
Braun, J.; Hülsing, A.; Wiesmaier, A.; Vigil, M.; Buchmann, J.
9th European PKI Workshop: Research and Applications (EuroPKI 2012), p.53-58
[Conference Proceedings]
On the Security of Encrypted Secret Sharing
Braun, J.; Wiesmaier, A.; Buchmann, J.
46th Hawaii International Conference on System Sciences (HICSS-46), p.4966-4975
[Conference Proceedings]
Privacy for Smart Metering Ecosystems
Ebinger, P.; Ramos, J. L. Hernández; Kikiras, P.; Lischka, M.; Wiesmaier, A.
First Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec12), p.120-131
[Conference Proceedings]
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis
Horsch, M.; Hühnlein, D.; Breitenstrom, C.; Wieland, T.; Wiesmaier, A.; Biallowons, B.; Petrautzki, D.; Potzernheim, S.; Schmölz, J.; Wesner, A.; Wich, T.
Informationssicherheit stärken — Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, p.391-403
[Conference Proceedings]
Multi Domain Information Architecture and Modeling for Smart Grids
Chandra-Sekaran, A.; Wiesmaier, A.; Hessler, A.
Innovative Smart Grid Technologies —- Asia (ISGT Asia), 2013 IEEE, p.1-6
[Conference Proceedings]
Decoupling Authentication from the Usage of Services
Horsch, M.; Braun, J.; Wiesmaier, A.
[Report]
Schlanke Infrastrukturen für den digitalen Rechtsverkehr
Braun, J.; Hülsing, A.; Wiesmaier, A.
[Report]
Method and System for Secure Access of a First Computer to a Second Computer
Wiesmaier, A.; Braun, J.; Horsch, M.
On the design and implementation of the Open eCard App
Hühnlein, D.; Petrautzki, D.; Schmölz, J.; Wich, T.; Horsch, M.; Wieland, T.; Eichholz, J.; Wiesmaier, A.; Braun, J.; Feldmann, F.; Potzernheim, S.; Schwenk, J.; Kahlo, C.; Kühne, A.; Veit, H.
Sicherheit 2012 — Schutz und Zuverlässigkeit, p.95-110
[Conference Proceedings]


