Publikationen

Publikationen

Multi-biometric continuous authentication: A trust model for an asynchronous system
N. Damer and F. Maul and C. Busch
2016 19th Intl. Conf. on Information Fusion (FUSION), p.2192–2199
[Conference Proceedings]


A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes
N. Buchmann and C. Rathgeb and J. Wagner and C. Busch and H. Baier
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]


BIOSIG 2016
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Stream ciphers in the IoT: Grain and Trivium
L. Diedrich and L. Murati and A. Wiesmaier
[Report]


Comparing Lightweight Hash Functions – PHOTON & Quark
L. Schmidt and T. Meuser and A. Wiesmaier
[Report]


Block ciphers PRESENT and SEA in comparison
T. Kußmaul and J. Löffer and A. Wiesmaier
[Report]


IoT: Challenges, Projects, Architectures
V. Gazis and M. Görtz and M. Huber and A. Leonardi and K. Mathioudakis and A. Wiesmaier and F. Zeiger
18th International Conference on Intelligence in Next Generation Networks (ICIN), p.145–147
[Conference Proceedings]


Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
M. Vigil and J. Buchmann and D. Cabarcas and C. Weinert and A. Wiesmaier
Computer & Security (Journal), Vol.50, p.16–32
[Journal Article]


Security Perspectives for Collaborative Data Acquisition in the Internet of Things
V. Gazis and C. Garcia Cordero and E. Vasilomanolakis and P. Kikiras and A. Wiesmaier
Internet of Things. IoT Infrastructures – IoT360 / SaSeIoT 2014, p.271-282


A View on Privacy & Trust in IoT
J. Daubert and A. Wiesmaier and P. Kikiras
IEEE ICC 2015 – First Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (SPIC), p.2665–2670
[Conference Proceedings]


A Survey of Technologies for the Internet of Things
V. Gazis and M. Görtz and M. Huber and A. Leonardi and K. Mathioudakis and A. Wiesmaier and F. Zeiger and E. Vasilomanolakis
2015 International Wireless Communications & Mobile Computing Conference (IWCMC), p.1090–1095
[Conference Proceedings]


End-2-End Privacy Architecture for IoT
S. Funke and J. Daubert and A. Wiesmaier and P. Kikiras and M. Mühlhäuser
Third IEEE Conference on Communications and Network Security (CNS 2015), p.705–706
[Conference Proceedings]


IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Christoph Krauß and Michael Waidner
Datenschutz und Datensicherheit, Vol.39, p.383-387
[Journal Article]


Towards Bloom Filter-based Indexing of Iris Biometric Data
C. Rathgeb and F. Breitinger and H. Baier and C. Busch
2015 Intl. Conf. on Biometrics (ICB), p.1–8
[Conference Proceedings]


Long term confidentiality: a survey
Braun, J. and Buchmann, J. and Mullan, C. and Wiesmaier, A.
Designs, Codes and Cryptography (Journal), Vol.71, p.459-478
[Journal Article]


Towards the Smart Grid: Substation Automation Architecture and Technologies
A. Leonardi and K. Mathioudakis and A. Wiesmaier and F. Zeiger
Advances in Electrical Engineering (Journal), Vol.Article ID 896296
[Journal Article]


Security framework – Guidelines for trust services providers – Part 1
I. Barreira and T. Gustavsson and A. Wiesmaier and C. Galan and S. Gorniak


Risk assessment – Guidelines for trust services providers – Part 2
I. Barreira and T. Gustavsson and A. Wiesmaier and C. Galan and S. Gorniak


Mitigating the impact of security incidents – Guidelines for trust services providers – Part 3
I. Barreira and T. Gustavsson and A. Wiesmaier and C. Galan and S. Gorniak


Introduction to Public Key Infrastructures
J. Buchmann and E. Karatsiolis and A. Wiesmaier
[Book]


How to Avoid the Breakdown of Public Key Infrastructures – Forward Secure Signatures for Certificate Authorities
J. Braun and A. Hülsing and A. Wiesmaier and M. Vigil and J. Buchmann
9th European PKI Workshop: Research and Applications (EuroPKI 2012), p.53–58
[Conference Proceedings]


On the Security of Encrypted Secret Sharing
J. Braun and A. Wiesmaier and J. Buchmann
46th Hawaii International Conference on System Sciences (HICSS-46), p.4966–4975
[Conference Proceedings]


Privacy for Smart Metering Ecosystems
P. Ebinger and J. L. Hernández Ramos and P. Kikiras and M. Lischka and A. Wiesmaier
First Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec12), p.120–131
[Conference Proceedings]


Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis
M. Horsch and D. Hühnlein and C. Breitenstrom and T. Wieland and A. Wiesmaier and B. Biallowons and D. Petrautzki and S. Potzernheim and J. Schmölz and A. Wesner and T. Wich
Informationssicherheit stärken – Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, p.391–403
[Conference Proceedings]


Multi Domain Information Architecture and Modeling for Smart Grids
A. Chandra-Sekaran and A. Wiesmaier and A. Hessler
Innovative Smart Grid Technologies — Asia (ISGT Asia), 2013 IEEE, p.1–6
[Conference Proceedings]


Decoupling Authentication from the Usage of Services
M. Horsch and J. Braun and A. Wiesmaier
[Report]


Schlanke Infrastrukturen für den digitalen Rechtsverkehr
J. Braun and A. Hülsing and A. Wiesmaier
[Report]


Method and System for Secure Access of a First Computer to a Second Computer
A. Wiesmaier and J. Braun and M. Horsch


On the design and implementation of the Open eCard App
D. Hühnlein and D. Petrautzki and J. Schmölz and T. Wich and M. Horsch and T. Wieland and J. Eichholz and A. Wiesmaier and J. Braun and F. Feldmann and S. Potzernheim and J. Schwenk and C. Kahlo and A. Kühne and H. Veit
Sicherheit 2012 – Schutz und Zuverlässigkeit, p.95 – 110
[Conference Proceedings]


iPIN and mTAN for Secure eID Applications
Braun, J. and Horsch, M. and Wiesmaier, A.
Information Security Practice and Experience (ISPEC 2012), p.259-276
[Conference Proceedings]