Publications

Publications

iPIN and mTAN for secure eID applications
Braun, Johannes; Horsch, Moritz; Wiesmaier, Alexander
8th International Conference on Information Security Practice and Experience (ISPEC 2012), p.259-276
[Conference Proceedings]


Cleaning up the PKI for Long-term Signatures
Vigil, Martín; Custódio, Ricardo Felipe
12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, p.140-153
[Conference Proceedings]


Smart Home Dashboard – Das intelligente Energiemanagement
Stopczynski, Martin; Ghiglieri, Marco
VDE KONGRESS 2012 Smart Grid
[Conference Proceedings]


Privacy-Preserving Architecture for Forensic Image Recognition
Peter, Andreas; Hartmann, T.; Müller, S.; Katzenbeisser, Stefan
International Workshop on Information Forensics and Security (WIFS 2012), p.79-84
[Conference Proceedings]


Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication
Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Sadeghi, Ahmad-Reza
BlackHat Abu Dhabi
[Conference Proceedings]


An efficient mobile PACE implementation
A. Wiesmaier and M. Horsch and J. Braun and F. Kiefer and D. Hühnlein and F. Strenzke and J. Buchmann
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176–185
[Conference Proceedings]


Mobile Authentisierung und Signatur
J. Braun and M. Horsch and A. Wiesmaier and D. Hühnlein
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32–43
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
[Conference Proceedings]


AmazonIA: When Elasticity Snaps Back
Bugiel, Sven; Pöppelmann, Thomas; Nürnberger, Stefan; Sadeghi, Ahmad-Reza; Schneider, Thomas
CCS '11: Proceedings of the 18th ACM conference on Computer and communications security, p.389-400
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
[Conference Proceedings]


Der Lifetime eSafe – ein sicheres elektronisches Schließfach
L. Langer and A. Wiesmaier
Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), p.155
[Conference Proceedings]


Towards a mobile eCard Client
J. Buchmann and A. Wiesmaier and D. Hühnlein and J. Braun and M. Horsch and F. Kiefer and F. Strenzke
Tagungsband zum 13. KryptoTag, p.4
[Conference Proceedings]


From Student Smartcard Applications to the German Electronic Identity Card
L. Langer and A. Schmidt and A. Wiesmaier
9th European Conference on e-Government – ECEG, p.430–435
[Conference Proceedings]


A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
D. Hühnlein and U. Korte and L. Langer and A. Wiesmaier
3rd International Conference on New Technologies, Mobility and Security (NTMS), p.1–5
[Conference Proceedings]


Intrinsically Legal-For-Trade Objects by Digital Signatures
Wiesmaier, A. and Rauchschwalbe, U. and Ludwig, C. and Henhapl, B. and Ruppert, M. and Buchmann, J.
Sicherheit 2006: Sicherheit – Schutz und Zuverlässigkeit, p.218–221
[Conference Proceedings]


An Electronic Scheme for the Farnel Paper-Based Voting Protocol
Araújo, R. and Custodio, R. and Wiesmaier, A. and Takagi, T.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.78–91
[Conference Proceedings]


On Firewalls and Tunneling
Frommer, J. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.190–205
[Conference Proceedings]


On Securing Unix Systems with Smart Cards
große Osterhues, D. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.143–157
[Conference Proceedings]


The State of the Art in DNS Spoofing
Steinhoff, U. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06)
[Conference Proceedings]


Towards Secure Electronic Workflows
Fritsch, S. and Karatsiolis, E. and Lippert, M. and Wiesmaier, A. and Buchmann, J.
Third European PKI Workshop: Theory and Practice (EuroPKI 2006), p.154–168
[Conference Proceedings]


Planning for Directory Services in Public Key Infrastructures
Karatsiolis, E. and Lippert, M. and Wiesmaier, A.
Sicherheit 2005, p.349–360
[Conference Proceedings]


Outflanking and Securely Using the PIN/TAN System
Wiesmaier, A. and Karatsiolis, E. and Lippert, M. and Buchmann, J.
2005 International Conference on Security and Management (SAM'05), p.313–319
[Conference Proceedings]


An Evaluated Certification Services System for the German National Root CA – Legally Binding and Trustworthy Transactions in E-Business and E-Government
Wiesmaier, A. and Lippert, M. and Karatsiolis, E. and Raptis, G. and Buchmann, J.
2005 International Conference on E-Business, Enterprise Information Systems, and Outsourcing (EEE'05), p.103–108
[Conference Proceedings]


The Workshop – Implementing Well Structured Enterprise Applications
Wiesmaier, A. and Karatsiolis, E. and Lippert, M. and Buchmann, J.
2005 International Conference on Software Engineering Research and Practice (SERP)'05, p.947–953
[Conference Proceedings]


Directory Based Registration in Public Key Infrastructures
Lippert, M. and Karatsiolis, E. and Wiesmaier, A. and Buchmann, J.
The 4th International Workshop for Applied PKI (IWAP'05), p.17–32
[Conference Proceedings]


Using LDAP Directories for Management of PKI Processes
Karatsiolis, E. and Lippert, M. and Wiesmaier, A.
Public Key Infrastructure: First European PKI Workshop: Research and Applications (EuroPKI'04), p.126–134
[Conference Proceedings]


The Key Authority – Secure Key Management in Hierarchical Public Key Infrastructures
Wiesmaier, A. and Lippert, M. and Karatsiolis, E.
International Conference on Security and Management (SAM'04), p.89–93
[Conference Proceedings]



A. Lukavchenko and H. Rajasekaran and A. Wiesmaier and P. Kikiras
[Conference Proceedings]