Publications

Publications

On the design and implementation of the Open eCard App
D. Hühnlein and D. Petrautzki and J. Schmölz and T. Wich and M. Horsch and T. Wieland and J. Eichholz and A. Wiesmaier and J. Braun and F. Feldmann and S. Potzernheim and J. Schwenk and C. Kahlo and A. Kühne and H. Veit
Sicherheit 2012 – Schutz und Zuverlässigkeit, p.95 – 110
[Conference Proceedings]


iPIN and mTAN for Secure eID Applications
Braun, J. and Horsch, M. and Wiesmaier, A.
Information Security Practice and Experience (ISPEC 2012), p.259-276
[Conference Proceedings]


Practical Security in E-Mail Applications
F. Kiefer and A. Wiesmaier and C. Fritz
The 2012 International Conference on Security and Management (SAM'12), p.138–144
[Conference Proceedings]


Verteilte Dienstnutzung mit dem neuen Personalausweis
M. Horsch and J. Braun and A. Wiesmaier and J. Schaaf and C. Baumöller
D-A-CH Security 2012, p.186 – 197
[Conference Proceedings]


An efficient mobile PACE implementation
A. Wiesmaier and M. Horsch and J. Braun and F. Kiefer and D. Hühnlein and F. Strenzke and J. Buchmann
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176–185
[Conference Proceedings]


Mobile Authentisierung und Signatur
J. Braun and M. Horsch and A. Wiesmaier and D. Hühnlein
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32–43
[Conference Proceedings]


Der Lifetime eSafe – ein sicheres elektronisches Schließfach
L. Langer and A. Wiesmaier
Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), p.155
[Conference Proceedings]


Towards a mobile eCard Client
J. Buchmann and A. Wiesmaier and D. Hühnlein and J. Braun and M. Horsch and F. Kiefer and F. Strenzke
Tagungsband zum 13. KryptoTag, p.4
[Conference Proceedings]


From Student Smartcard Applications to the German Electronic Identity Card
L. Langer and A. Schmidt and A. Wiesmaier
9th European Conference on e-Government – ECEG, p.430–435
[Conference Proceedings]


A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
D. Hühnlein and U. Korte and L. Langer and A. Wiesmaier
3rd International Conference on New Technologies, Mobility and Security (NTMS), p.1–5
[Conference Proceedings]


Intrinsically Legal-For-Trade Objects by Digital Signatures
Wiesmaier, A. and Rauchschwalbe, U. and Ludwig, C. and Henhapl, B. and Ruppert, M. and Buchmann, J.
Sicherheit 2006: Sicherheit – Schutz und Zuverlässigkeit, p.218–221
[Conference Proceedings]


An Electronic Scheme for the Farnel Paper-Based Voting Protocol
Araújo, R. and Custodio, R. and Wiesmaier, A. and Takagi, T.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.78–91
[Conference Proceedings]


On Firewalls and Tunneling
Frommer, J. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.190–205
[Conference Proceedings]


On Securing Unix Systems with Smart Cards
große Osterhues, D. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.143–157
[Conference Proceedings]


The State of the Art in DNS Spoofing
Steinhoff, U. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06)
[Conference Proceedings]


Towards Secure Electronic Workflows
Fritsch, S. and Karatsiolis, E. and Lippert, M. and Wiesmaier, A. and Buchmann, J.
Third European PKI Workshop: Theory and Practice (EuroPKI 2006), p.154–168
[Conference Proceedings]


Planning for Directory Services in Public Key Infrastructures
Karatsiolis, E. and Lippert, M. and Wiesmaier, A.
Sicherheit 2005, p.349–360
[Conference Proceedings]


Outflanking and Securely Using the PIN/TAN System
Wiesmaier, A. and Karatsiolis, E. and Lippert, M. and Buchmann, J.
2005 International Conference on Security and Management (SAM'05), p.313–319
[Conference Proceedings]


An Evaluated Certification Services System for the German National Root CA – Legally Binding and Trustworthy Transactions in E-Business and E-Government
Wiesmaier, A. and Lippert, M. and Karatsiolis, E. and Raptis, G. and Buchmann, J.
2005 International Conference on E-Business, Enterprise Information Systems, and Outsourcing (EEE'05), p.103–108
[Conference Proceedings]


The Workshop – Implementing Well Structured Enterprise Applications
Wiesmaier, A. and Karatsiolis, E. and Lippert, M. and Buchmann, J.
2005 International Conference on Software Engineering Research and Practice (SERP)'05, p.947–953
[Conference Proceedings]


Directory Based Registration in Public Key Infrastructures
Lippert, M. and Karatsiolis, E. and Wiesmaier, A. and Buchmann, J.
The 4th International Workshop for Applied PKI (IWAP'05), p.17–32
[Conference Proceedings]


Using LDAP Directories for Management of PKI Processes
Karatsiolis, E. and Lippert, M. and Wiesmaier, A.
Public Key Infrastructure: First European PKI Workshop: Research and Applications (EuroPKI'04), p.126–134
[Conference Proceedings]


The Key Authority – Secure Key Management in Hierarchical Public Key Infrastructures
Wiesmaier, A. and Lippert, M. and Karatsiolis, E.
International Conference on Security and Management (SAM'04), p.89–93
[Conference Proceedings]



A. Lukavchenko and H. Rajasekaran and A. Wiesmaier and P. Kikiras
[Conference Proceedings]