Publications

Publications

Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication
Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Sadeghi, Ahmad-Reza
BlackHat Abu Dhabi
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
[Conference Proceedings]


An efficient mobile PACE implementation
Wiesmaier, A.; Horsch, M.; Braun, J.; Kiefer, F.; Hühnlein, D.; Strenzke, F.; Buchmann, J.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176-185
[Conference Proceedings]


Mobile Authentisierung und Signatur
Braun, J.; Horsch, M.; Wiesmaier, A.; Hühnlein, D.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32-43
[Conference Proceedings]


AmazonIA: When Elasticity Snaps Back
Bugiel, Sven; Pöppelmann, Thomas; Nürnberger, Stefan; Sadeghi, Ahmad-Reza; Schneider, Thomas
18. ACM Conference on Computer and Communications Security (CCS'11), p.389-400
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
[Conference Proceedings]


Towards a mobile eCard Client
Buchmann, J.; Wiesmaier, A.; Hühnlein, D.; Braun, J.; Horsch, M.; Kiefer, F.; Strenzke, F.
Tagungsband zum 13. KryptoTag, p.4
[Conference Proceedings]


Der Lifetime eSafe — ein sicheres elektronisches Schließfach
Langer, L.; Wiesmaier, A.
Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), p.155
[Conference Proceedings]


From Student Smartcard Applications to the German Electronic Identity Card
Langer, L.; Schmidt, A.; Wiesmaier, A.
9th European Conference on e-Government — ECEG, p.430-435
[Conference Proceedings]


A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
Hühnlein, D.; Korte, U.; Langer, L.; Wiesmaier, A.
3rd International Conference on New Technologies, Mobility and Security (NTMS), p.1-5
[Conference Proceedings]


Intrinsically Legal-For-Trade Objects by Digital Signatures
Wiesmaier, A.; Rauchschwalbe, U.; Ludwig, C.; Henhapl, B.; Ruppert, M.; Buchmann, J.
Sicherheit 2006: Sicherheit — Schutz und Zuverlässigkeit, p.218-221
[Conference Proceedings]


An Electronic Scheme for the Farnel Paper-Based Voting Protocol
Araújo, R.; Custodio, R.; Wiesmaier, A.; Takagi, T.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.78-91
[Conference Proceedings]


On Firewalls and Tunneling
Frommer, J.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.190-205
[Conference Proceedings]


On Securing Unix Systems with Smart Cards
große Osterhues, D.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.143-157
[Conference Proceedings]


The State of the Art in DNS Spoofing
Steinhoff, U.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06)
[Conference Proceedings]


Towards Secure Electronic Workflows
Fritsch, S.; Karatsiolis, E.; Lippert, M.; Wiesmaier, A.; Buchmann, J.
Third European PKI Workshop: Theory and Practice (EuroPKI 2006), p.154-168
[Conference Proceedings]


Planning for Directory Services in Public Key Infrastructures
Karatsiolis, E.; Lippert, M.; Wiesmaier, A.
Sicherheit 2005, p.349-360
[Conference Proceedings]


Outflanking and Securely Using the PIN/TAN System
Wiesmaier, A.; Karatsiolis, E.; Lippert, M.; Buchmann, J.
2005 International Conference on Security and Management (SAM 05), p.313-319
[Conference Proceedings]


An Evaluated Certification Services System for the German National Root CA — Legally Binding and Trustworthy Transactions in E-Business and E-Government
Wiesmaier, A.; Lippert, M.; Karatsiolis, E.; Raptis, G.; Buchmann, J.
2005 International Conference on E-Business, Enterprise Information Systems, and Outsourcing (EEE 05), p.103-108
[Conference Proceedings]


The Workshop — Implementing Well Structured Enterprise Applications
Wiesmaier, A.; Karatsiolis, E.; Lippert, M.; Buchmann, J.
2005 International Conference on Software Engineering Research and Practice (SERP) 05, p.947-953
[Conference Proceedings]


Directory Based Registration in Public Key Infrastructures
Lippert, M.; Karatsiolis, E.; Wiesmaier, A.; Buchmann, J.
The 4th International Workshop for Applied PKI (IWAP 05), p.17-32
[Conference Proceedings]


Using LDAP Directories for Management of PKI Processes
Karatsiolis, E.; Lippert, M.; Wiesmaier, A.
Public Key Infrastructure: First European PKI Workshop: Research and Applications (EuroPKI 04), p.126-134
[Conference Proceedings]


The Key Authority — Secure Key Management in Hierarchical Public Key Infrastructures
Wiesmaier, A.; Lippert, M.; Karatsiolis, E.
International Conference on Security and Management (SAM 04), p.89-93
[Conference Proceedings]