Publikationen

Publikationen

Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware
Bugiel, Sven; Heuser, Stephan; Sadeghi, Ahmad-Reza
[Report]


Privacy-Preserving Architecture for Forensic Image Recognition
Peter, Andreas; Hartmann, T.; Müller, S.; Katzenbeisser, Stefan
International Workshop on Information Forensics and Security (WIFS 2012), p.79-84
[Conference Proceedings]


Physical Unclonable Functions: Sicher­heits­eigen­schaften und Anwendungen
Katzenbeisser, Stefan; Schaller, André
Datenschutz und Datensicherheit, p.881-885
[Journal Article]


A Selection of Recent lattice-Based Signature and Encryption Schemes
Bansarkhani, Rachid El; Cabarcas, Daniel; Kuo, Po-Chun; Schmidt, Patrick; Schneider, Michael
Tatra Mountains Mathematical Publications, p.81-102
[Journal Article]


Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication
Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Sadeghi, Ahmad-Reza
BlackHat Abu Dhabi
[Conference Proceedings]


Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen
Braun, Johannes; Hülsing, Andreas; Wiesmaier, Alexander
[Report]


Secure Long-Term Record Keeping in the Public Sector
Langer, L.; Wiesmaier, A.; Buchmann, J.
eGovernment Review (Journal), Vol.7, p.14-15
[Journal Article]


Mobile eID application for the German identity card
Horsch, M.; Braun, J.; Wiesmaier, A.
[Report]


Der elektronische Safe als ver­trauens­würdiger Cloud Service
Klieme, E.; Strick, L.; Wunderlich, W.; Braun, J.; Wiesmaier, A.
[Report]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
[Conference Proceedings]


An efficient mobile PACE implementation
Wiesmaier, A.; Horsch, M.; Braun, J.; Kiefer, F.; Hühnlein, D.; Strenzke, F.; Buchmann, J.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176-185
[Conference Proceedings]


In-packet Bloom filters: Design and networking applications
Esteve, C.; Macapuna, C.; Magalhaes, M.; Verdi, F.; Wiesmaier, A.
Computer Networks (Journal), Vol.55, p.1364-1378
[Journal Article]


Mobile Authentisierung und Signatur
Braun, J.; Horsch, M.; Wiesmaier, A.; Hühnlein, D.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32-43
[Conference Proceedings]


AmazonIA: When Elasticity Snaps Back
Bugiel, Sven; Pöppelmann, Thomas; Nürnberger, Stefan; Sadeghi, Ahmad-Reza; Schneider, Thomas
CCS '11: Proceedings of the 18th ACM conference on Computer and communications security, p.389-400
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
[Conference Proceedings]


Cryptographic Application Scenarios
Karatsiolis, E.; Langer, L.; Schmidt, A.; Tews, E.; Wiesmaier, A.
[Report]


Eine kurze Geschichte der Schlüssel
Buchmann, J.; Wiesmaier, A.
360$^\circ$ — Fachmagazin für das Management im öffentlichen Sektor (Journal), Vol.17, p.21-23
[Journal Article]


Innovative Personalausweisanwendungen — Mehrwert des elektronischen Personalausweises jenseits von Portal- und Formularanwendungen
Langer, L.; Schmidt, A.; Wiesmaier, A.
[Report]


Towards a mobile eCard Client
Buchmann, J.; Wiesmaier, A.; Hühnlein, D.; Braun, J.; Horsch, M.; Kiefer, F.; Strenzke, F.
Tagungsband zum 13. KryptoTag, p.4
[Conference Proceedings]


Der Lifetime eSafe — ein sicheres elektronisches Schließfach
Langer, L.; Wiesmaier, A.
Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), p.155
[Conference Proceedings]


Langfristige Sicherheit am Beispiel eines virtuellen Tresors
Langer, L.; Wiesmaier, A.
[Report]


Projekt Campuspilot — Akzeptanzbericht
Langer, L.; Schmidt, A.; Wiesmaier, A.
[Report]


From Student Smartcard Applications to the German Electronic Identity Card
Langer, L.; Schmidt, A.; Wiesmaier, A.
9th European Conference on e-Government — ECEG, p.430-435
[Conference Proceedings]


A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
Hühnlein, D.; Korte, U.; Langer, L.; Wiesmaier, A.
3rd International Conference on New Technologies, Mobility and Security (NTMS), p.1-5
[Conference Proceedings]


MAVA — Modular Security for Distributed Applications
Rexroth, P.; Wiesmaier, A.
[Report]


The State of the Art in Algorithmic Encryption
Wiesmaier, A.
[Report]


The T-Vote Protocol
Araújo, R.; Wiesmaier, A.; Buchmann, J.
[Report]


Intrinsically Legal-For-Trade Objects by Digital Signatures
Wiesmaier, A.; Rauchschwalbe, U.; Ludwig, C.; Henhapl, B.; Ruppert, M.; Buchmann, J.
Sicherheit 2006: Sicherheit — Schutz und Zuverlässigkeit, p.218-221
[Conference Proceedings]


Digital signierte Wägeresultate — Neue Wege in der Sicherung eichfähiger Messwerte
Rauchschwalbe, U.; Wiesmaier, A.; Ludwig, C.; Buchmann, J.
WDM — Wägen, Dosieren + Mischen (Journal), Vol.3, p.23-27
[Journal Article]


An Electronic Scheme for the Farnel Paper-Based Voting Protocol
Araújo, R.; Custodio, R.; Wiesmaier, A.; Takagi, T.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.78-91
[Conference Proceedings]