TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 65.

Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Appel, Michael and Bossert, Andreas and Cooper, Steven and Kußmaul, Tobias and Löffler, Johannes and Pauer, Christof and Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Diedrich, Lennart and Jattke, Patrick and Murati, Lulzim and Senker, Matthias and Wiesmaier, Alexander (2016):
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
[Report]

Jattke, Patrick and Senker, Matthias and Wiesmaier, Alexander (2016):
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
[Report]

Lieb, Patrick and Schmidt, Markus and Wiesmaier, Alexander (2016):
ECDSA and QUARTZ in Comparison with RSA.
[Report]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Roepke, Rene and Thraem, Timo and Wagener, Johannes and Wiesmaier, Alexander (2016):
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.
[Report]

Bossert, Andreas and Cooper, Steven and Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Funke, Sebastian and Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis and Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
In: IEEE Conference on Communications and Network Security (CNS), poster proceedings, IEEE, Florence, Italy, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Daubert, Jörg and Luthra, Manisha and Gazis, Vangelis and Wiesmaier, Alexander and Kikiras, Panayotis (2015):
On the Security and Privacy of Internet of Things Architectures and Systems.
In: International Workshop on Secure Internet of Things (SIoT) 2015, ESORICS, IEEE, Vienna, Austria, ISBN 978-1-4673-7769-0,
DOI: 10.1109/SIOT.2015.9,
[Conference or Workshop Item]

Gazis, Vangelis and Görtz, Manuel and Huber, Marco and Leonardi, Alessandro and Mathioudakis, Kostas and Wiesmaier, Alexander and Zeiger, Florian and Vasilomanolakis, Emmanouil (2015):
A Survey of Technologies for the Internet of Things.
In: International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop, IEEE, Dubrovnik, Croatia, ISBN 978-1-4799-5343-1,
DOI: 10.1109/IWCMC.2015.7289234,
[Conference or Workshop Item]

Kußmaul, Tobias and Löffler, Johannes and Wiesmaier, Alexander (2015):
Block ciphers PRESENT and SEA in comparison.
[Report]

Meuser, Tobias and Schmidt, Larissa and Wiesmaier, Alexander (2015):
Comparing Lightweight Hash Functions – PHOTON & Quark.
[Report]

Diedrich, Lennart and Murati, Lulzim and Wiesmaier, Alexander (2015):
Stream ciphers in the IoT: Grain and Trivium.
[Report]

Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE, In: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference or Workshop Item]

Vigil, Martín and Buchmann, Johannes and Cabarcas, Daniel and Weinert, Christian and Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, pp. 16-32, 50, [Article]

Wiesmaier, Alexander and Braun, Johannes and Horsch, Moritz (2014):
EP 2639997 - Method and system for secure access of a first computer to a second computer.
[Standards, patents]

Braun, Johannes and Buchmann, Johannes and Mullan, Ciaran and Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, pp. 459-478, 71, (3), DOI: 10.1007/s10623-012-9747-6,
[Article]

Buchmann, Johannes and Karatsiolis, Evangelos and Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Horsch, Moritz and Hühnlein, Detlef and Breitenstrom, Christian and Wieland, Thomas and Wiesmaier, Alexander and Biallowons, Benedikt and Petrautzki, Dirk and Potzernheim, Simon and Schmölz, Johannes and Wesner, Alexander and Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Baumöller, Claas and Schaaf, Joachim and Horsch, Moritz and Wiesmaier, Alexander and Braun, Johannes (2013):
EP 2600270 Identification element-based authentication and identification with decentralised service use.
[Standards, patents]

Braun, Johannes and Wiesmaier, Alexander and Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander
Ryan, Mark and Smyth, Ben and Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Springer, Hangzhou, China, In: LNCS, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander and Vigil, Martín and Buchmann, Johannes
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Kiefer, Franziskus and Wiesmaier, Alexander and Fritz, Christian (2012):
Practical Security in E-Mail Applications.
In: The 2012 International Conference on Security and Management (SAM’12), Las Vegas, USA, [Conference or Workshop Item]

Vigil, Martín Gagliotti and Cabarcas, Daniel and Wiesmaier, Alexander and Buchmann, Johannes (2012):
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive, [Article]

Hühnlein, Detlef and Petrautzki, Dirk and Schmölz, Johannes and Wich, Tobias and Horsch, Moritz and Wieland, Thomas and Eichholz, Jan and Wiesmaier, Alexander and Braun, Johannes and Feldmann, Florian and Potzernheim, Simon and Schwenk, Jörg and Kahlo, Christian and Kühne, Andreas and Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit, Darmstadt, [Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander and Schaaf, Joachim and Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September, [Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Klieme, Eric and Strick, Linda and Wunderlich, Wolfgang (2011):
Der elektronische Safe als vertrauenswürdiger Cloud Service.
[Report]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander and Hühnlein, Detlef
Schartner, Peter and Taeger, Jürgen (eds.) (2011):
Mobile Authentisierung und Signatur.
In: D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, syssec Verlag, Oldenburg, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander (2011):
Mobile eID application for the German identity card.
[Report]

Rothenberg, Christian Esteve and Macapuna, Carlos A. B. and Magalhães, Maurício F. and Verdi, Fábio and Wiesmaier, Alexander (2011):
In-packet Bloom Filters: Design and Networking Applications.
In: Computer Networks - The International Journal of Computer and Telecommunications Networking, pp. 1364-1378, 55, (6), [Article]

Wiesmaier, Alexander and Horsch, Moritz and Braun, Johannes and Kiefer, Franziskus and Hühnlein, Detlef and Strenzke, Falko and Buchmann, Johannes
Cheung, Bruce and Hui, Lucas Chi Kwong and Sandhu, Ravi and Wong, Duncan (eds.) (2011):
An efficient mobile PACE implementation.
In: ASIA CCS '11: 6th ACM Symposium on Information, Computer and Communications Security, ACM, Hong Kong, In: ACM Symposium on Information, Computer and Communications Security, DOI: 10.1145/1966913.1966936,
[Conference or Workshop Item]

Langer, Lucie and Wiesmaier, Alexander and Buchmann, Johannes (2011):
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, pp. 14-15, (7), [Article]

Langer, Lucie and Schmidt, Axel and Wiesmaier, Alexander (2010):
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.
[Report]

Buchmann, Johannes and Wiesmaier, Alexander (2010):
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, pp. 21-23, (17), [Article]

Karatsiolis, Vangelis and Langer, Lucie and Schmidt, Axel and Tews, Erik and Wiesmaier, Alexander (2010):
Cryptographic Application Scenarios.
(TI-01/10), [Report]

Buchmann, Johannes and Braun, Johannes and Horsch, Moritz and Hühnlein, Detlef and Kiefer, Franziskus and Strenzke, Falko and Wiesmaier, Alexander (2010):
Towards a mobile eCard Client.
In: 13. Kryptotag, Darmstadt, [Conference or Workshop Item]

Hühnlein, Detlef and Korte, Ulrike and Langer, Lucie and Wiesmaier, Alexander (2009):
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
In: 3rd International Conference on New Technologies, Mobility and Security (NTMS), IEEE Press, DOI: 10.1109/NTMS.2009.5384830,
[Conference or Workshop Item]

Langer, Lucie and Wiesmaier, Alexander (2009):
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
In: 8th European Conference on Digital Archiving (ECA2010), Geneva, Switzerland, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Wiesmaier, Alexander (2009):
Projekt Campuspilot -- Akzeptanzbericht.
(TI-2/09), [Report]

Langer, Lucie and Wiesmaier, Alexander (2009):
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.
[Report]

Wiesmaier, Alexander (2009):
Secure private key management in adaptable public key infrastructures.
Berlin, Mensch-und-Buch-Verl., ISBN 978-3-86664-646-9,
[Book]

Langer, Lucie and Schmidt, Axel and Wiesmaier, Alexander (2009):
From Student Smartcard Applications to the German Electronic Identity Card.
In: ECEG09, ACI, ISBN 978-1-906638-34-4,
[Conference or Workshop Item]

Rexroth, Peer and Wiesmaier, Alexander (2007):
MAVA - Modular Security for Distributed Applications.
(TI-1/07), [Report]

Lippert, Marcus and Karatsiolis, Evangelos and Wiesmaier, Alexander and Buchmann, Johannes (2006):
Life-Cycle Management of X.509 Certifcates Based on LDAP Directories.
In: >Journal of Computer Security, pp. 419-439, 14(5), [Article]

Araújo, Roberto and Wiesmaier, Alexander and Buchmann, Johannes (2006):
The T-Vote Protocol.
(TI-3/06), [Report]

Wiesmaier, Alexander and Rauchschwalbe, Ulrich and Ludwig, Christoph and Henhapl, Birgit and Ruppert, Markus and Buchmann, Johannes (2006):
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: SICHERHEIT 2006, Sicherheit - Schutz und Zuverlässigkeit, 3. Jahrestagung, Magdeburg, In: LNI, P-77, [Conference or Workshop Item]

Wiesmaier, Alexander and Ludwig, Christoph and Rauchschwalbe, Ulrich and Henhapl, Birgit and Ruppert, Markus and Buchmann, Johannes (2006):
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagungdes Fachbereichs der Gesellschaft für Informatik e.V., Darmstadt, ISBN 3-88579-171-4,
[Conference or Workshop Item]

Rauchschwalbe, Ulrich and Wiesmaier, Alexander and Ludwig, Christoph and Buchmann, Johannes (2006):
Digital Signierte Wägeresultate - Neue Wege in der Sicherung eichfähiger Messwerte.
In: >Wägen, Dosieren, Mischen - (WDM), pp. 23--27, 3/2006, [Article]

Araújo, Roberto and Custódio, Ricardo Felipe and Wiesmaier, Alexander and Takagi, Tsuyoshi (2006):
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
In: Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), Springer, [Conference or Workshop Item]

Frommer, J. and Wiesmaier, Alexander and Araújo, Roberto and Lippert, Marcus
Zhou, Jianying and Yung, Moti and Bao, Feng (eds.) (2006):
On Firewalls and Tunneling.
In: Industrial Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS'06), Singapore, [Conference or Workshop Item]

Wiesmaier, Alexander (2006):
The State of the Art in Algorithmic Encryption.
(TI-1/06), [Report]

Lippert, Marcus and Karatsiolis, Evangelos and Wiesmaier, Alexander and Buchmann, Johannes (2005):
Directory Based Registration in Public Key Infrastructures.
In: The 4th International Workshop for Applied PKI (IWAP’05), IOS Press, [Conference or Workshop Item]

Wiesmaier, Alexander and Lippert, Marcus and Karatsiolis, Vangelis and Raptis, Georgios and Buchmann, Johannes (2005):
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
In: EEE 2005 - International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-76-9,
[Conference or Workshop Item]

Wiesmaier, Alexander and Karatsiolis, Vangelis and Lippert, Marcus and Buchmann, Johannes (2005):
The Workshop - Implementing Well Structured Enterprise Applications.
In: SERP 2005 - International Conference on Software Engineering Research and Practice, CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-50-5,
[Conference or Workshop Item]

Wiesmaier, Alexander and Fischer, Mike and Lippert, Marcus and Buchmann, Johannes (2005):
Outflanking and Securely Using the PIN/TAN-System.
In: SAM 2005 - International Conference on Security and Management, CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-82-3,
[Conference or Workshop Item]

Karatsiolis, Evangelos and Lippert, Marcus and Wiesmaier, Alexander (2005):
Planning for Directory Services in Public Key Infrastructures.
In: Sicherheit 2005: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), GI, Regensburg, In: LNI, 62, ISBN 3-88579-391-1,
[Conference or Workshop Item]

Wiesmaier, Alexander and Lippert, Marcus and Karatsiolis, Vangelis (2004):
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures.
In: Security and Management 2004, Las Vegas, Nevada, USA, ISBN 1-932415-37-8,
[Conference or Workshop Item]

Karatsiolis, Vangelis and Lippert, Marcus and Wiesmaier, Alexander and Pitaev, Anna and Ruppert, Markus and Buchmann, Johannes (2004):
Towards a Flexible {Intra-Trustcenter} Management Protocol.
In: >CoRR, cs.CR/0411067, [Article]

Karatsiolis, Vangelis and Lippert, Marcus and Wiesmaier, Alexander (2004):
Using {LDAP} Directories for Management of {PKI} Processes.
In: Public Key Infrastructure, Springer Berlin/Heidelberg, 3093, ISBN 978-3-540-22216-3,
[Conference or Workshop Item]

Wiesmaier, Alexander (2001):
{FlexiTRUST CA} Ein flexibles, skalierbares und dynamisch erweiterbares Trustcenter.
Technische Universität Darmstadt, [Master Thesis]

This list was generated on Sat Oct 19 00:08:08 2019 CEST.