Alexander Wiesmaier

According to our database1, Alexander Wiesmaier authored at least 51 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Efficient practical Byzantine consensus using random linear network coding.
Ann. des Télécommunications, February, 2023

QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging.
IACR Cryptol. ePrint Arch., 2023

On the State of Crypto-Agility.
IACR Cryptol. ePrint Arch., 2023

SoK: Post-Quantum TLS Handshake.
IACR Cryptol. ePrint Arch., 2023

Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model.
IACR Cryptol. ePrint Arch., 2023

A Review of existing GDPR Solutions for Citizens and SMEs.
CoRR, 2023

Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review.
CoRR, 2023

Managing the Migration to Post-Quantum-Cryptography.
CoRR, 2023

Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics.
Proceedings of the Information Security - 26th International Conference, 2023

2022
crypto<sub>lib</sub>: Comparing and selecting cryptography libraries (long version of EICC 2022 publication).
CoRR, 2022

Towards a Maturity Model for Crypto-Agility Assessment.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

cryptolib: Comparing and selecting cryptography libraries.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
On PQC Migration and Crypto-Agility.
CoRR, 2021

Zur Integration von Post-Quantum Verfahren in bestehende Softwareprodukte.
CoRR, 2021

On Message-based Consensus and Network Coding.
Proceedings of the 12th International Conference on Network of the Future, 2021

On the State of Post-Quantum Cryptography Migration.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021

2020
Zur Benutzbarkeit und Verwendung von API-Dokumentationen.
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020

2019
API Usability of Stateful Signature Schemes.
Proceedings of the Advances in Information and Computer Security, 2019

2017
Constrained PET Composition for Measuring Enforced Privacy.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2015
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey.
Comput. Secur., 2015

On the Security and Privacy of Internet of Things Architectures and Systems.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

A survey of technologies for the internet of things.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Short Paper: IoT: Challenges, projects, architectures.
Proceedings of the 18th International Conference on Intelligence in Next Generation Networks, 2015

A view on privacy & trust in IoT.
Proceedings of the IEEE International Conference on Communication, 2015

End-2-End privacy architecture for IoT.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Long term confidentiality: a survey.
Des. Codes Cryptogr., 2014

Security Perspectives for Collaborative Data Acquisition in the Internet of Things.
Proceedings of the Internet of Things. IoT Infrastructures, 2014

2013
On the Security of Encrypted Secret Sharing.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Introduction to Public Key Infrastructures.
Springer, ISBN: 978-3-642-40656-0, 2013

2012
Privacy in Smart Metering Ecosystems.
Proceedings of the Smart Grid Security - First International Workshop, 2012


iPIN and mTAN for Secure eID Applications.
Proceedings of the Information Security Practice and Experience, 2012

How to Avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
In-packet Bloom filters: Design and networking applications.
Comput. Networks, 2011

An efficient mobile PACE implementation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Secure private key management in adaptable public key infrastructures.
PhD thesis, 2009

In-packet Bloom filters: Design and networking applications
CoRR, 2009

A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
Proceedings of the NTMS 2009, 2009

2006
Life-cycle management of X.509 certificates based on LDAP directories.
J. Comput. Secur., 2006

Intrinsically Legal-For-Trade Objects by Digital Signatures.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Towards Secure Electronic Workflows.
Proceedings of the Public Key Infrastructure, 2006

2005
Planning for Directory Services in Public Key Infrastructures.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

The Workshop - Implementing Well Structured Enterprise Applications.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005

Directory Based Registration in Public Key Infrastructures.
Proceedings of the Applied Public Key Infrastructure, 2005

Ouflanking and Securely Using the PIN/TAN-System.
Proceedings of The 2005 International Conference on Security and Management, 2005

An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
Proceedings of The 2005 International Conference on E-Business, 2005

2004
Towards a Flexible Intra-Trustcenter Management Protocol
CoRR, 2004

An Evaluated Certification Services System for the German National Root CA
CoRR, 2004

Outflanking and securely using the PIN/TAN-System
CoRR, 2004

Using LDAP Directories for Management of PKI Processes.
Proceedings of the Public Key Infrastructure, 2004

The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures.
Proceedings of the International Conference on Security and Management, 2004


  Loading...