Publikationen

Publikationen

The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents
Vigil, Martín; Moecke, Cristian Thiago; Custódio, Ricardo Felipe; Volkamer, Melanie
EuroPKI 2012, September 13-14, p.85-97
[Conference Proceedings]


PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
Katzenbeisser, Stefan; Kocabaş, Ünal; Rožic, Vladimir; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Wachsmann, Christian
Workshop on Cryptographic Hardware and Embedded Systems (CHES), p.283-301
[Conference Proceedings]


On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
Göttert, Norman; Feller, Thomas; Schneider, Michael; Huss, Sorin; Buchmann, Johannes
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), p.512-529
[Conference Proceedings]


How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities
Braun, Johannes; Hülsing, Andreas; Wiesmaier, Alexander; Vigil, Martín; Buchmann, Johannes
Public Key Infrastructures, Services and Applications - EuroPKI 2012, p.53-68
[Conference Proceedings]


Towards the Systematic Development of Contextualized Security Interventions
Bartsch, Steffen; Volkamer, Melanie
Designing Interactive Secure Systems (DISS), BCS HCI 2012
[Conference Proceedings]


Context determines content: an approach to resource recommendation in folksonomies
Rodenhausen, Thomas; Anjorin, Mojisola; Dominguez Garcia, Renato; Rensing, Christoph
Proceedings of the 4th ACM RecSys workshop on Recommender systems and the social web, p.17-24
[Conference Proceedings]


The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
Schläpfer, Michael; Volkamer, Melanie
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, p.410-418
[Conference Proceedings]


Malacoda: towards high-level compilation of network security applications on reconfigurable hardware
Mühlbach, Sascha; Koch, Andreas
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, p.247-258
[Conference Proceedings]


Secure Two-Party Computations in ANSI C
Holzer, Andreas; Franz, Martin; Katzenbeisser, Stefan; Veith, Helmut
Conference on Computer and Communications Security (CCS 2012), p.772-783
[Conference Proceedings]


iPIN and mTAN for secure eID applications
Braun, Johannes; Horsch, Moritz; Wiesmaier, Alexander
8th International Conference on Information Security Practice and Experience (ISPEC 2012), p.259-276
[Conference Proceedings]


Cleaning up the PKI for Long-term Signatures
Vigil, Martín; Custódio, Ricardo Felipe
12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, p.140-153
[Conference Proceedings]


Smart Home Dashboard – Das intelligente Energiemanagement
Stopczynski, Martin; Ghiglieri, Marco
VDE KONGRESS 2012 Smart Grid
[Conference Proceedings]


Privacy-Preserving Architecture for Forensic Image Recognition
Peter, Andreas; Hartmann, T.; Müller, S.; Katzenbeisser, Stefan
International Workshop on Information Forensics and Security (WIFS 2012), p.79-84
[Conference Proceedings]


Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication
Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Sadeghi, Ahmad-Reza
BlackHat Abu Dhabi
[Conference Proceedings]


An efficient mobile PACE implementation
A. Wiesmaier and M. Horsch and J. Braun and F. Kiefer and D. Hühnlein and F. Strenzke and J. Buchmann
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176–185
[Conference Proceedings]


Mobile Authentisierung und Signatur
J. Braun and M. Horsch and A. Wiesmaier and D. Hühnlein
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32–43
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
[Conference Proceedings]


AmazonIA: When Elasticity Snaps Back
Bugiel, Sven; Pöppelmann, Thomas; Nürnberger, Stefan; Sadeghi, Ahmad-Reza; Schneider, Thomas
CCS '11: Proceedings of the 18th ACM conference on Computer and communications security, p.389-400
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
[Conference Proceedings]


Der Lifetime eSafe – ein sicheres elektronisches Schließfach
L. Langer and A. Wiesmaier
Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), p.155
[Conference Proceedings]


Towards a mobile eCard Client
J. Buchmann and A. Wiesmaier and D. Hühnlein and J. Braun and M. Horsch and F. Kiefer and F. Strenzke
Tagungsband zum 13. KryptoTag, p.4
[Conference Proceedings]


From Student Smartcard Applications to the German Electronic Identity Card
L. Langer and A. Schmidt and A. Wiesmaier
9th European Conference on e-Government – ECEG, p.430–435
[Conference Proceedings]


A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
D. Hühnlein and U. Korte and L. Langer and A. Wiesmaier
3rd International Conference on New Technologies, Mobility and Security (NTMS), p.1–5
[Conference Proceedings]


Intrinsically Legal-For-Trade Objects by Digital Signatures
Wiesmaier, A. and Rauchschwalbe, U. and Ludwig, C. and Henhapl, B. and Ruppert, M. and Buchmann, J.
Sicherheit 2006: Sicherheit – Schutz und Zuverlässigkeit, p.218–221
[Conference Proceedings]


An Electronic Scheme for the Farnel Paper-Based Voting Protocol
Araújo, R. and Custodio, R. and Wiesmaier, A. and Takagi, T.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.78–91
[Conference Proceedings]


On Firewalls and Tunneling
Frommer, J. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.190–205
[Conference Proceedings]


On Securing Unix Systems with Smart Cards
große Osterhues, D. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), p.143–157
[Conference Proceedings]


The State of the Art in DNS Spoofing
Steinhoff, U. and Wiesmaier, A. and Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06)
[Conference Proceedings]


Towards Secure Electronic Workflows
Fritsch, S. and Karatsiolis, E. and Lippert, M. and Wiesmaier, A. and Buchmann, J.
Third European PKI Workshop: Theory and Practice (EuroPKI 2006), p.154–168
[Conference Proceedings]


Planning for Directory Services in Public Key Infrastructures
Karatsiolis, E. and Lippert, M. and Wiesmaier, A.
Sicherheit 2005, p.349–360
[Conference Proceedings]