Andreas Heinemann

Orcid: 0000-0003-0240-399X

According to our database1, Andreas Heinemann authored at least 52 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On the State of Crypto-Agility.
IACR Cryptol. ePrint Arch., 2023

A Review of existing GDPR Solutions for Citizens and SMEs.
CoRR, 2023

Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review.
CoRR, 2023

9. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2023, 2023

Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics.
Proceedings of the Information Security - 26th International Conference, 2023

Crypto-agile Design and Testbed for QKD-Networks.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2022
crypto<sub>lib</sub>: Comparing and selecting cryptography libraries (long version of EICC 2022 publication).
CoRR, 2022

8. Usable Security und PrivacyWorkshop.
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022

Towards a Maturity Model for Crypto-Agility Assessment.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

cryptolib: Comparing and selecting cryptography libraries.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
On PQC Migration and Crypto-Agility.
CoRR, 2021

Zur Integration von Post-Quantum Verfahren in bestehende Softwareprodukte.
CoRR, 2021

7. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2021, 2021

On the State of Post-Quantum Cryptography Migration.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021

It is not as simple as that: Playing out password security trainings in order to nudge password changes.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
6. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020

Zur Benutzbarkeit und Verwendung von API-Dokumentationen.
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020

2019
Datenschutz muss benutzbar sein.
Datenschutz und Datensicherheit, 2019

5. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2019, 2019

Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software.
Proceedings of the Mensch und Computer 2019, 2019

API Usability of Stateful Signature Schemes.
Proceedings of the Advances in Information and Computer Security, 2019

Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

2018
Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2.
Proceedings of the Sicherheit 2018, 2018

4. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2018, 2018

2017
Report.
Datenschutz und Datensicherheit, 2017

Alle reden über Blockchain.
Datenschutz und Datensicherheit, 2017

Design and Implementation Aspects of Mobile Derived Identities.
Proceedings of the Open Identity Summit 2017, 2017

3. Workshop Usable Security: Ziele der Usability und Security ausbalancieren.
Proceedings of the Mensch und Computer 2017, 2017

2016
Zur Benutzbarkeit der AusweisApp2.
Proceedings of the Mensch und Computer 2016, 2016

Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

Workshop: Nutzerzentrierte Sicherheit - NzS 2016.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

2008
Security for Ubiquitous Computing.
Proceedings of the Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises, 2008

Opportunistic Networks.
Proceedings of the Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises, 2008

Online-Rezensionsjournale der Geschichtswissenschaft.
ZfBB, 2008

Analyzing the Robustness of CertainTrust.
Proceedings of the Trust Management II, 2008

Incentives for Opportunistic Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Opportunistic Data Dissemination Using Real-World User Mobility Traces.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments.
Proceedings of the The Third International Conference on Availability, 2008

2007
Collaboration in opportunistic networks: rethinking mobile ad-hoc communication.
PhD thesis, 2007

Security and Privacy in Pervasive Computing.
IEEE Pervasive Comput., 2007

Inherent Tradeoffs in Ubiquitous Computing Services.
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007

2006
Incentives for electronic coupon systems.
Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, 2006

2005
Location Privacy.
Proceedings of the Handbook of Algorithms for Wireless Networking and Mobile Computing., 2005

A Privacy Preserving Reputation System for Mobile Information Dissemination Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Spontaneous Collaboration in Mobile Peer-to-Peer Networks.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

2004
Zur rechtsverträglichen Technikgestaltung anheind einer M-Commerce-Anwendung.
Proceedings of the Mobile Economy, 2004

An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

2003
Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003

iClouds - Peer-to-Peer Information Sharing in Mobile Environments.
Proceedings of the Euro-Par 2003. Parallel Processing, 2003

2002
Engineering Multimedia-Aware Personalized Ubiquitous Services.
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002

2000
Dependable High Performance Computing on a Parallel Sysplex Cluster.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000


  Loading...