default search action
Alexander Wiesmaier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier:
A Comprehensive Survey on Post-Quantum TLS. IACR Commun. Cryptol. 1(2): 6 (2024) - [j6]Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Chiara-Marie Zok:
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey. ACM Trans. Embed. Comput. Syst. 23(2): 34:1-34:28 (2024) - [c33]Nils von Nethen, Alexander Wiesmaier, Nouri Alnahawi, Johanna Henrich:
PMMP-PQC Migration Management Process✱. EICC 2024: 144-154 - [c32]Nicolai Schmitt, Johanna Henrich, Dominik Heinz, Nouri Alnahawi, Alexander Wiesmaier:
On Criteria and Tooling for Cryptographic Inventories. Sicherheit 2024: 49-63 - 2023
- [j5]Michael Braun, Alexander Wiesmaier, Nouri Alnahawi:
Efficient practical Byzantine consensus using random linear network coding. Ann. des Télécommunications 78(1-2): 33-51 (2023) - [c31]Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen:
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging. ACNS 2023: 85-111 - [c30]Johanna Henrich, Andreas Heinemann, Alexander Wiesmaier, Nicolai Schmitt:
Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics. ISC 2023: 267-287 - [i22]Nils von Nethen, Alexander Wiesmaier, Oliver Weissmann, Nouri Alnahawi:
Managing the Migration to Post-Quantum-Cryptography. CoRR abs/2301.04491 (2023) - [i21]Nico Puhlmann, Alexander Wiesmaier, Andreas Heinemann:
Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review. CoRR abs/2302.00325 (2023) - [i20]Erik Klinger, Alexander Wiesmaier, Andreas Heinemann:
A Review of existing GDPR Solutions for Citizens and SMEs. CoRR abs/2302.03581 (2023) - [i19]Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen:
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging. IACR Cryptol. ePrint Arch. 2023: 430 (2023) - [i18]Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Andreas Heinemann, Tobias Grasmeyer:
On the State of Crypto-Agility. IACR Cryptol. ePrint Arch. 2023: 487 (2023) - [i17]Nouri Alnahawi, Kathrin Hövelmanns, Andreas Hülsing, Silvia Ritsch, Alexander Wiesmaier:
Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model. IACR Cryptol. ePrint Arch. 2023: 1368 (2023) - [i16]Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier:
SoK: Post-Quantum TLS Handshake. IACR Cryptol. ePrint Arch. 2023: 1873 (2023) - 2022
- [c29]Jan Wohlwender, Rolf Huesmann, Andreas Heinemann, Alexander Wiesmaier:
cryptolib: Comparing and selecting cryptography libraries. EICC 2022: 6-11 - [c28]Julian Hohm, Andreas Heinemann, Alexander Wiesmaier:
Towards a Maturity Model for Crypto-Agility Assessment. FPS 2022: 104-119 - [i15]Julian Hohm, Andreas Heinemann, Alexander Wiesmaier:
Towards a maturity model for crypto-agility assessment. CoRR abs/2202.07645 (2022) - [i14]Jan Wohlwender, Rolf Huesmann, Andreas Heinemann, Alexander Wiesmaier:
cryptolib: Comparing and selecting cryptography libraries (long version of EICC 2022 publication). CoRR abs/2203.16370 (2022) - 2021
- [c27]Nouri Alnahawi, Alexander Wiesmaier, Tobias Grasmeyer, Julian Geißler, Alexander Zeier, Pia Bauspieß, Andreas Heinemann:
On the State of Post-Quantum Cryptography Migration. GI-Jahrestagung 2021: 907-941 - [c26]Michael Braun, Alexander Wiesmaier, Nouri Alnahawi, Julian Geißler:
On Message-based Consensus and Network Coding. NoF 2021: 1-9 - [i13]Alexander Zeier, Alexander Wiesmaier, Andreas Heinemann:
Zur Integration von Post-Quantum Verfahren in bestehende Softwareprodukte. CoRR abs/2102.00157 (2021) - [i12]Alexander Wiesmaier, Nouri Alnahawi, Tobias Grasmeyer, Julian Geißler, Alexander Zeier, Pia Bauspieß, Andreas Heinemann:
On PQC Migration and Crypto-Agility. CoRR abs/2106.09599 (2021) - 2020
- [c25]Rolf Huesmann, Alexander Zeier, Andreas Heinemann, Alexander Wiesmaier:
Zur Benutzbarkeit und Verwendung von API-Dokumentationen. MuC (Workshopband) 2020 - [i11]Rolf Huesmann, Alexander Zeier, Andreas Heinemann, Alexander Wiesmaier:
Zur Benutzbarkeit und Verwendung von API-Dokumentationen. CoRR abs/2007.04983 (2020)
2010 – 2019
- 2019
- [c24]Alexander Zeier, Alexander Wiesmaier, Andreas Heinemann:
API Usability of Stateful Signature Schemes. IWSEC 2019: 221-240 - 2017
- [c23]Sebastian Funke, Alexander Wiesmaier, Jörg Daubert:
Constrained PET Composition for Measuring Enforced Privacy. ARES 2017: 16:1-16:10 - 2015
- [j4]Martín A. Gagliotti Vigil, Johannes Buchmann, Daniel Cabarcas, Christian Weinert, Alexander Wiesmaier:
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. Comput. Secur. 50: 16-32 (2015) - [c22]Sebastian Funke, Jörg Daubert, Alexander Wiesmaier, Panayotis Kikiras, Max Mühlhäuser:
End-2-End privacy architecture for IoT. CNS 2015: 705-706 - [c21]Jörg Daubert, Alexander Wiesmaier, Panayotis Kikiras:
A view on privacy & trust in IoT. ICC Workshops 2015: 2665-2670 - [c20]Vangelis Gazis, Manuel Görtz, Marco F. Huber, Alessandro Leonardi, Kostas Mathioudakis, Alexander Wiesmaier, Florian Zeiger:
Short Paper: IoT: Challenges, projects, architectures. ICIN 2015: 145-147 - [c19]Vangelis Gazis, Manuel Görtz, Marco F. Huber, Alessandro Leonardi, Kostas Mathioudakis, Alexander Wiesmaier, Florian Zeiger, Emmanouil Vasilomanolakis:
A survey of technologies for the internet of things. IWCMC 2015: 1090-1095 - [c18]Emmanouil Vasilomanolakis, Jörg Daubert, Manisha Luthra, Vangelis Gazis, Alexander Wiesmaier, Panayotis Kikiras:
On the Security and Privacy of Internet of Things Architectures and Systems. SIoT 2015: 49-57 - 2014
- [j3]Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alexander Wiesmaier:
Long term confidentiality: a survey. Des. Codes Cryptogr. 71(3): 459-478 (2014) - [c17]Vangelis Gazis, Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Panayotis Kikiras, Alexander Wiesmaier:
Security Perspectives for Collaborative Data Acquisition in the Internet of Things. IoT360 (2) 2014: 271-282 - 2013
- [b2]Johannes Buchmann, Evangelos G. Karatsiolis, Alexander Wiesmaier:
Introduction to Public Key Infrastructures. Springer 2013, ISBN 978-3-642-40656-0, pp. 1-164 - [c16]Johannes Braun, Alexander Wiesmaier, Johannes Buchmann:
On the Security of Encrypted Secret Sharing. HICSS 2013: 4966-4975 - 2012
- [c15]Johannes Braun, Andreas Hülsing, Alexander Wiesmaier, Martín A. Gagliotti Vigil, Johannes Buchmann:
How to Avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities. EuroPKI 2012: 53-68 - [c14]Johannes Braun, Moritz Horsch, Alexander Wiesmaier:
iPIN and mTAN for Secure eID Applications. ISPEC 2012: 259-276 - [c13]Detlef Hühnlein, Dirk Petrautzki, Johannes Schmölz, Tobias Wich, Moritz Horsch, Thomas Wieland, Jan Eichholz, Alexander Wiesmaier, Johannes Braun, Florian Feldmann, Simon Potzernheim, Jörg Schwenk, Christian Kahlo, Andreas Kühne, Heiko Veit:
On the design and implementation of the Open eCard App. Sicherheit 2012: 95-110 - [c12]Peter Ebinger, José Luis Hernández Ramos, Panayotis Kikiras, Mario Lischka, Alexander Wiesmaier:
Privacy in Smart Metering Ecosystems. SmartGridSec 2012: 120-131 - [i10]Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alexander Wiesmaier:
Long Term Confidentiality: a Survey. IACR Cryptol. ePrint Arch. 2012: 449 (2012) - 2011
- [j2]Christian Esteve Rothenberg, Carlos Alberto Braz Macapuna, Maurício F. Magalhães, Fábio Luciano Verdi, Alexander Wiesmaier:
In-packet Bloom filters: Design and networking applications. Comput. Networks 55(6): 1364-1378 (2011) - [c11]Alexander Wiesmaier, Moritz Horsch, Johannes Braun, Franziskus Kiefer, Detlef Hühnlein, Falko Strenzke, Johannes Buchmann:
An efficient mobile PACE implementation. AsiaCCS 2011: 176-185
2000 – 2009
- 2009
- [b1]Alexander Wiesmaier:
Secure private key management in adaptable public key infrastructures. Darmstadt University of Technology, 2009, ISBN 978-3-86664-646-9, pp. 1-216 - [c10]Detlef Hühnlein, Ulrike Korte, Lucie Langer, Alexander Wiesmaier:
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data. NTMS 2009: 1-5 - [i9]Christian Esteve Rothenberg, Carlos Alberto Braz Macapuna, Alexander Wiesmaier:
In-packet Bloom filters: Design and networking applications. CoRR abs/0908.3574 (2009) - 2006
- [j1]Marcus Lippert, Vangelis Karatsiolis, Alexander Wiesmaier, Johannes Buchmann:
Life-cycle management of X.509 certificates based on LDAP directories. J. Comput. Secur. 14(5): 419-439 (2006) - [c9]Sebastian Fritsch, Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier, Johannes Buchmann:
Towards Secure Electronic Workflows. EuroPKI 2006: 154-168 - [c8]Alexander Wiesmaier, Ulrich Rauchschwalbe, Christoph Ludwig, Birgit Henhapl, Markus Ruppert, Johannes Buchmann:
Intrinsically Legal-For-Trade Objects by Digital Signatures. Sicherheit 2006: 218-221 - [i8]Alexander Wiesmaier, Ulrich Rauchschwalbe, Christoph Ludwig, Birgit Henhapl, Markus Ruppert, Johannes Buchmann:
Intrinsically Legal-For-Trade Objects by Digital Signatures. CoRR abs/cs/0603011 (2006) - 2005
- [c7]Alexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis, Georgios Raptis, Johannes Buchmann:
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government. CSREA EEE 2005: 103-110 - [c6]Alexander Wiesmaier, Mike Fisher, Marcus Lippert, Johannes Buchmann:
Ouflanking and Securely Using the PIN/TAN-System. Security and Management 2005: 313-319 - [c5]Marcus Lippert, Evangelos G. Karatsiolis, Alexander Wiesmaier, Johannes Buchmann:
Directory Based Registration in Public Key Infrastructures. IWAP 2005: 17-32 - [c4]Alexander Wiesmaier, Vangelis Karatsiolis, Marcus Lippert, Johannes Buchmann:
The Workshop - Implementing Well Structured Enterprise Applications. Software Engineering Research and Practice 2005: 947- - [c3]Evangelos G. Karatsiolis, Marcus Lippert, Alexander Wiesmaier:
Planning for Directory Services in Public Key Infrastructures. Sicherheit 2005: 349-360 - [i7]Alexander Wiesmaier, Vangelis Karatsiolis, Marcus Lippert, Johannes Buchmann:
The Workshop - Implementing Well Structured Enterprise Applications. CoRR abs/cs/0506050 (2005) - 2004
- [c2]Alexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis:
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures. Security and Management 2004: 89-93 - [c1]Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier:
Using LDAP Directories for Management of PKI Processes. EuroPKI 2004: 126-134 - [i6]Alexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis:
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures. CoRR cs.CR/0410024 (2004) - [i5]Alexander Wiesmaier, Marcus Fischer, Evangelos G. Karatsiolis, Marcus Lippert:
Outflanking and securely using the PIN/TAN-System. CoRR cs.CR/0410025 (2004) - [i4]Evangelos G. Karatsiolis, Marcus Lippert, Alexander Wiesmaier:
An Evaluated Certification Services System for the German National Root CA. CoRR cs.CR/0411065 (2004) - [i3]Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier:
Using LDAP Directories for Management of PKI Processes. CoRR cs.CR/0411066 (2004) - [i2]Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier, A. Pitaev, Markus Ruppert, Johannes Buchmann:
Towards a Flexible Intra-Trustcenter Management Protocol. CoRR cs.CR/0411067 (2004) - [i1]Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier:
Planning for Directory Services in Public Key Infrastructures. CoRR cs.CR/0411068 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint