Alexander Wiesmaier
Alexander Wiesmaier
Darmstadt University of Applied Sciences
Verified email at - Homepage
Cited by
Cited by
On the security and privacy of Internet of Things architectures and systems
E Vasilomanolakis, J Daubert, M Luthra, V Gazis, A Wiesmaier, P Kikiras
2015 International Workshop on Secure Internet of Things (SIoT), 49-57, 2015
A survey of technologies for the internet of things
V Gazis, M Görtz, M Huber, A Leonardi, K Mathioudakis, A Wiesmaier, ...
2015 International Wireless Communications and Mobile Computing Conference …, 2015
Introduction to public key infrastructures
J Buchmann, E Karatsiolis, A Wiesmaier, E Karatsiolis
Springer, 2013
Short paper: IoT: Challenges, projects, architectures
V Gazis, M Goertz, M Huber, A Leonardi, K Mathioudakis, A Wiesmaier, ...
2015 18th International Conference on Intelligence in Next Generation …, 2015
A view on privacy & trust in IoT
J Daubert, A Wiesmaier, P Kikiras
2015 IEEE International Conference on Communication Workshop (ICCW), 2665-2670, 2015
In-packet Bloom filters: Design and networking applications
CE Rothenberg, CAB Macapuna, MF Magalhăes, FL Verdi, A Wiesmaier
Computer Networks 55 (6), 1364-1378, 2011
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier
Computers & Security 50, 16-32, 2015
Long term confidentiality: a survey
J Braun, J Buchmann, C Mullan, A Wiesmaier
Designs, Codes and Cryptography 71 (3), 459-478, 2014
Towards the smart grid: substation automation architecture and technologies
A Leonardi, K Mathioudakis, A Wiesmaier, F Zeiger
Advances in Electrical Engineering 2014, 2014
A comprehensive reference architecture for trustworthy long-term archiving of sensitive data
D Huhnlein, U Korte, L Langer, A Wiesmaier
2009 3rd International Conference on New Technologies, Mobility and Security …, 2009
The state of the art in DNS spoofing
U Steinhoff, A Wiesmaier, R Araújo
Proc. 4th Intl. Conf. Applied Cryptography and Network Security (ACNS), 2006
On the design and implementation of the Open eCard App
D Hühnlein, D Petrautzki, J Schmölz, T Wich, M Horsch, T Wieland, ...
SICHERHEIT 2012–Sicherheit, Schutz und Zuverlässigkeit, 2012
Data ingestion and analytics platform with systems, methods and computer program products useful in conjunction therewith
A Wiesmaier, O Haller
US Patent App. 15/865,628, 2018
End-2-End privacy architecture for IoT
S Funke, J Daubert, A Wiesmaier, P Kikiras, M Muehlhaeuser
2015 IEEE Conference on Communications and Network Security (CNS), 705-706, 2015
Outflanking and securely using the PIN/TAN-System
A Wiesmaier, M Fischer, M Lippert, J Buchmann
arXiv preprint cs/0410025, 2004
Privacy in smart metering ecosystems
P Ebinger, JLH Ramos, P Kikiras, M Lischka, A Wiesmaier
International Workshop on Smart Grid Security, 120-131, 2012
Using LDAP Directories for Management of PKI Processes
V Karatsiolis, M Lippert, A Wiesmaier
European Public Key Infrastructure Workshop, 126-134, 2004
Directory Based Registration in Public Key Infrastructures.
M Lippert, EG Karatsiolis, A Wiesmaier, J Buchmann
IWAP, 17-32, 2005
An efficient mobile PACE implementation
A Wiesmaier, M Horsch, J Braun, F Kiefer, D Hhnlein, F Strenzke, ...
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
Security perspectives for collaborative data acquisition in the internet of things
V Gazis, CG Cordero, E Vasilomanolakis, P Kikiras, A Wiesmaier
International Internet of Things Summit, 271-282, 2014
The system can't perform the operation now. Try again later.
Articles 1–20