Alexander Wiesmaier
Orcid: 0000-0002-1144-549X
According to our database1,
Alexander Wiesmaier
authored at least 56 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
10
3
8
1
2
1
1
1
1
1
3
2
1
2
2
1
1
1
5
1
1
4
1
1
2
5
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Trans. Embed. Comput. Syst., March, 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Sicherheit, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
2023
Ann. des Télécommunications, February, 2023
IACR Cryptol. ePrint Arch., 2023
Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model.
IACR Cryptol. ePrint Arch., 2023
Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review.
CoRR, 2023
Proceedings of the Information Security - 26th International Conference, 2023
2022
crypto<sub>lib</sub>: Comparing and selecting cryptography libraries (long version of EICC 2022 publication).
CoRR, 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
2021
CoRR, 2021
Proceedings of the 12th International Conference on Network of the Future, 2021
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021
2020
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020
2019
Proceedings of the Advances in Information and Computer Security, 2019
2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2015
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey.
Comput. Secur., 2015
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the 18th International Conference on Intelligence in Next Generation Networks, 2015
Proceedings of the IEEE International Conference on Communication, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Proceedings of the Internet of Things. IoT Infrastructures, 2014
2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
Proceedings of the Smart Grid Security - First International Workshop, 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Information Security Practice and Experience, 2012
How to Avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2009
PhD thesis, 2009
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
Proceedings of the NTMS 2009, 2009
2006
J. Comput. Secur., 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the Public Key Infrastructure, 2006
2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
The Workshop - Implementing Well Structured Enterprise Applications.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Ouflanking and Securely Using the PIN/TAN-System.
Proceedings of The 2005 International Conference on Security and Management, 2005
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
Proceedings of The 2005 International Conference on E-Business, 2005
2004
CoRR, 2004
Proceedings of the Public Key Infrastructure, 2004
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures.
Proceedings of the International Conference on Security and Management, 2004