Publikationen

Publikationen

Practical Security in E-Mail Applications
F. Kiefer and A. Wiesmaier and C. Fritz
The 2012 International Conference on Security and Management (SAM'12), p.138–144
[Conference Proceedings]


Verteilte Dienstnutzung mit dem neuen Personalausweis
M. Horsch and J. Braun and A. Wiesmaier and J. Schaaf and C. Baumöller
D-A-CH Security 2012, p.186 – 197
[Conference Proceedings]


Secure Long-Term Record Keeping in the Public Sector
L. Langer and A. Wiesmaier and J. Buchmann
eGovernment Review (Journal), Vol.7, p.14–15
[Journal Article]


Mobile eID application for the German identity card
M. Horsch and J. Braun and A. Wiesmaier
[Report]


Der elektronische Safe als ver­trauens­würdiger Cloud Service
E. Klieme and L. Strick and W. Wunderlich and J. Braun and A. Wiesmaier
[Report]


An efficient mobile PACE implementation
A. Wiesmaier and M. Horsch and J. Braun and F. Kiefer and D. Hühnlein and F. Strenzke and J. Buchmann
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176–185
[Conference Proceedings]


In-packet Bloom filters: Design and networking applications
C. Esteve and C. Macapuna and M. Magalhaes and F. Verdi and A. Wiesmaier
Computer Networks (Journal), Vol.55, p.1364–1378
[Journal Article]


Mobile Authentisierung und Signatur
J. Braun and M. Horsch and A. Wiesmaier and D. Hühnlein
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32–43
[Conference Proceedings]


Cryptographic Application Scenarios
E. Karatsiolis and L. Langer and A. Schmidt and E. Tews and A. Wiesmaier
[Report]


Eine kurze Geschichte der Schlüssel
J. Buchmann and A. Wiesmaier
360° – Fachmagazin für das Management im öffentlichen Sektor (Journal), Vol.17, p.21–23
[Journal Article]


Innovative Personalausweisanwendungen – Mehrwert des elektronischen Personalausweises jenseits von Portal- und Formularanwendungen
L. Langer and A. Schmidt and A. Wiesmaier
[Report]


Der Lifetime eSafe – ein sicheres elektronisches Schließfach
L. Langer and A. Wiesmaier
Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), p.155
[Conference Proceedings]


Towards a mobile eCard Client
J. Buchmann and A. Wiesmaier and D. Hühnlein and J. Braun and M. Horsch and F. Kiefer and F. Strenzke
Tagungsband zum 13. KryptoTag, p.4
[Conference Proceedings]


Langfristige Sicherheit am Beispiel eines virtuellen Tresors
L. Langer and A. Wiesmaier
[Report]


Projekt Campuspilot – Akzeptanzbericht
L. Langer and A. Schmidt and A. Wiesmaier
[Report]


Secure Private Key Management in Adaptable Public Key Infrastructures
Wiesmaier, A.
[Dissertation]


From Student Smartcard Applications to the German Electronic Identity Card
L. Langer and A. Schmidt and A. Wiesmaier
9th European Conference on e-Government – ECEG, p.430–435
[Conference Proceedings]


A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
D. Hühnlein and U. Korte and L. Langer and A. Wiesmaier
3rd International Conference on New Technologies, Mobility and Security (NTMS), p.1–5
[Conference Proceedings]


MAVA – Modular Security for Distributed Applications
Rexroth, P. and Wiesmaier, A.
[Report]


The State of the Art in Algorithmic Encryption
Wiesmaier, A.
[Report]


The T-Vote Protocol
R. Araújo and A. Wiesmaier and J. Buchmann
[Report]


Electronic Online Voting System
Ahrens, A. and Buchmann, J. and Heinold, F. and Mues, E. and Vossl, A. and Araújo, R. and Wiesmaier, A.


Intrinsically Legal-For-Trade Objects by Digital Signatures
Wiesmaier, A. and Rauchschwalbe, U. and Ludwig, C. and Henhapl, B. and Ruppert, M. and Buchmann, J.
Sicherheit 2006: Sicherheit – Schutz und Zuverlässigkeit, p.218–221
[Conference Proceedings]


Digital signierte Wägeresultate – Neue Wege in der Sicherung eichfähiger Messwerte
Rauchschwalbe, U. and Wiesmaier, A. and Ludwig, C. and Buchmann, J.
WDM – Wägen, Dosieren + Mischen (Journal), Vol.3, p.23–27
[Journal Article]


An Electronic Scheme for the Farnel Paper-Based Voting Protocol
Araújo, R. and Custodio, R. and Wiesmaier, A. and Takagi, T.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.78–91
[Conference Proceedings]


On Firewalls and Tunneling
Frommer, J. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.190–205
[Conference Proceedings]


On Securing Unix Systems with Smart Cards
große Osterhues, D. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.143–157
[Conference Proceedings]


The State of the Art in DNS Spoofing
Steinhoff, U. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06)
[Conference Proceedings]


Towards Secure Electronic Workflows
Fritsch, S. and Karatsiolis, E. and Lippert, M. and Wiesmaier, A. and Buchmann, J.
Third European PKI Workshop: Theory and Practice (EuroPKI 2006), p.154–168
[Conference Proceedings]


Life-Cycle Management of X.509 Certificates Based on LDAP Directories
Lippert, M. and Karatsiolis, E. and Wiesmaier, A. and Buchmann, J.
Journal of Computer Security, Vol.14, p.419–439
[Journal Article]