Publications

Publications

Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen
Braun, Johannes; Hülsing, Andreas; Wiesmaier, Alexander
[Report]


Secure Long-Term Record Keeping in the Public Sector
Langer, L.; Wiesmaier, A.; Buchmann, J.
eGovernment Review (Journal), Vol.7, p.14-15
[Journal Article]


Mobile eID application for the German identity card
Horsch, M.; Braun, J.; Wiesmaier, A.
[Report]


Der elektronische Safe als ver­trauens­würdiger Cloud Service
Klieme, E.; Strick, L.; Wunderlich, W.; Braun, J.; Wiesmaier, A.
[Report]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
[Conference Proceedings]


An efficient mobile PACE implementation
Wiesmaier, A.; Horsch, M.; Braun, J.; Kiefer, F.; Hühnlein, D.; Strenzke, F.; Buchmann, J.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176-185
[Conference Proceedings]


In-packet Bloom filters: Design and networking applications
Esteve, C.; Macapuna, C.; Magalhaes, M.; Verdi, F.; Wiesmaier, A.
Computer Networks (Journal), Vol.55, p.1364-1378
[Journal Article]


Mobile Authentisierung und Signatur
Braun, J.; Horsch, M.; Wiesmaier, A.; Hühnlein, D.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32-43
[Conference Proceedings]


AmazonIA: When Elasticity Snaps Back
Bugiel, Sven; Pöppelmann, Thomas; Nürnberger, Stefan; Sadeghi, Ahmad-Reza; Schneider, Thomas
18. ACM Conference on Computer and Communications Security (CCS'11), p.389-400
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
[Conference Proceedings]


Cryptographic Application Scenarios
Karatsiolis, E.; Langer, L.; Schmidt, A.; Tews, E.; Wiesmaier, A.
[Report]


Eine kurze Geschichte der Schlüssel
Buchmann, J.; Wiesmaier, A.
360$^\circ$ — Fachmagazin für das Management im öffentlichen Sektor (Journal), Vol.17, p.21-23
[Journal Article]


Innovative Personalausweisanwendungen — Mehrwert des elektronischen Personalausweises jenseits von Portal- und Formularanwendungen
Langer, L.; Schmidt, A.; Wiesmaier, A.
[Report]


Towards a mobile eCard Client
Buchmann, J.; Wiesmaier, A.; Hühnlein, D.; Braun, J.; Horsch, M.; Kiefer, F.; Strenzke, F.
Tagungsband zum 13. KryptoTag, p.4
[Conference Proceedings]


Der Lifetime eSafe — ein sicheres elektronisches Schließfach
Langer, L.; Wiesmaier, A.
Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), p.155
[Conference Proceedings]


Langfristige Sicherheit am Beispiel eines virtuellen Tresors
Langer, L.; Wiesmaier, A.
[Report]


Projekt Campuspilot — Akzeptanzbericht
Langer, L.; Schmidt, A.; Wiesmaier, A.
[Report]


From Student Smartcard Applications to the German Electronic Identity Card
Langer, L.; Schmidt, A.; Wiesmaier, A.
9th European Conference on e-Government — ECEG, p.430-435
[Conference Proceedings]


A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
Hühnlein, D.; Korte, U.; Langer, L.; Wiesmaier, A.
3rd International Conference on New Technologies, Mobility and Security (NTMS), p.1-5
[Conference Proceedings]


MAVA — Modular Security for Distributed Applications
Rexroth, P.; Wiesmaier, A.
[Report]


The State of the Art in Algorithmic Encryption
Wiesmaier, A.
[Report]


The T-Vote Protocol
Araújo, R.; Wiesmaier, A.; Buchmann, J.
[Report]


Intrinsically Legal-For-Trade Objects by Digital Signatures
Wiesmaier, A.; Rauchschwalbe, U.; Ludwig, C.; Henhapl, B.; Ruppert, M.; Buchmann, J.
Sicherheit 2006: Sicherheit — Schutz und Zuverlässigkeit, p.218-221
[Conference Proceedings]


Digital signierte Wägeresultate — Neue Wege in der Sicherung eichfähiger Messwerte
Rauchschwalbe, U.; Wiesmaier, A.; Ludwig, C.; Buchmann, J.
WDM — Wägen, Dosieren + Mischen (Journal), Vol.3, p.23-27
[Journal Article]


An Electronic Scheme for the Farnel Paper-Based Voting Protocol
Araújo, R.; Custodio, R.; Wiesmaier, A.; Takagi, T.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.78-91
[Conference Proceedings]


On Firewalls and Tunneling
Frommer, J.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.190-205
[Conference Proceedings]


On Securing Unix Systems with Smart Cards
große Osterhues, D.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.143-157
[Conference Proceedings]


The State of the Art in DNS Spoofing
Steinhoff, U.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06)
[Conference Proceedings]


Towards Secure Electronic Workflows
Fritsch, S.; Karatsiolis, E.; Lippert, M.; Wiesmaier, A.; Buchmann, J.
Third European PKI Workshop: Theory and Practice (EuroPKI 2006), p.154-168
[Conference Proceedings]


Life-Cycle Management of X.509 Certificates Based on LDAP Directories
Lippert, M.; Karatsiolis, E.; Wiesmaier, A.; Buchmann, J.
Journal of Computer Security, Vol.14, p.419-439
[Journal Article]