Alexander Wiesmaier
Alexander Wiesmaier
Darmstadt University of Applied Sciences
Verified email at - Homepage
Cited by
Cited by
On the security and privacy of Internet of Things architectures and systems
E Vasilomanolakis, J Daubert, M Luthra, V Gazis, A Wiesmaier, P Kikiras
2015 International workshop on secure internet of things (SIoT), 49-57, 2015
A survey of technologies for the internet of things
V Gazis, M Görtz, M Huber, A Leonardi, K Mathioudakis, A Wiesmaier, ...
2015 international wireless communications and mobile computing conference …, 2015
Introduction to public key infrastructures
J Buchmann, E Karatsiolis, A Wiesmaier, E Karatsiolis
Springer, 2013
Short paper: IoT: Challenges, projects, architectures
V Gazis, M Goertz, M Huber, A Leonardi, K Mathioudakis, A Wiesmaier, ...
2015 18th international conference on intelligence in next generation …, 2015
A view on privacy & trust in IoT
J Daubert, A Wiesmaier, P Kikiras
2015 IEEE International Conference on Communication Workshop (ICCW), 2665-2670, 2015
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier
Computers & Security 50, 16-32, 2015
In-packet Bloom filters: Design and networking applications
CE Rothenberg, CAB Macapuna, MF Magalhăes, FL Verdi, A Wiesmaier
Computer Networks 55 (6), 1364-1378, 2011
Long term confidentiality: a survey
J Braun, J Buchmann, C Mullan, A Wiesmaier
Designs, Codes and Cryptography 71, 459-478, 2014
Towards the smart grid: substation automation architecture and technologies
A Leonardi, K Mathioudakis, A Wiesmaier, F Zeiger
Advances in electrical engineering 2014 (1), 896296, 2014
Data ingestion and analytics platform with systems, methods and computer program products useful in conjunction therewith
A Wiesmaier, O Haller
US Patent App. 15/865,628, 2018
The state of the art in DNS spoofing
U Steinhoff, A Wiesmaier, R Araújo
Proc. 4th Intl. Conf. Applied Cryptography and Network Security (ACNS), 2006
A comprehensive reference architecture for trustworthy long-term archiving of sensitive data
D Huhnlein, U Korte, L Langer, A Wiesmaier
2009 3rd International Conference on New Technologies, Mobility and Security …, 2009
System, method and computer program product for analytics assignment
A Wiesmaier, O Haller, M Borgmann
US Patent App. 15/865,472, 2018
On the design and implementation of the Open eCard App
D Hühnlein, D Petrautzki, J Schmölz, T Wich, M Horsch, T Wieland, ...
Gesellschaft für Informatik eV, 2012
Block ciphers for the iot–simon, speck, katan, led, tea, present, and sea compared
M Appel, A Bossert, S Cooper, T Kußmaul, J Löffler, C Pauer, ...
Proc. Appel Block CF, 1-37, 2016
Privacy in smart metering ecosystems
P Ebinger, JL Hernández Ramos, P Kikiras, M Lischka, A Wiesmaier
International Workshop on Smart Grid Security, 120-131, 2012
End-2-End privacy architecture for IoT
S Funke, J Daubert, A Wiesmaier, P Kikiras, M Muehlhaeuser
2015 IEEE Conference on Communications and Network Security (CNS), 705-706, 2015
Outflanking and securely using the PIN/TAN-System
A Wiesmaier, M Fischer, M Lippert, J Buchmann
arXiv preprint cs/0410025, 2004
On the state of crypto-agility
N Alnahawi, N Schmitt, A Wiesmaier, A Heinemann, T Grasmeyer
Cryptology ePrint Archive, 2023
Using ldap directories for management of pki processes
V Karatsiolis, M Lippert, A Wiesmaier
Public Key Infrastructure: First European PKI Workshop: Research and …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20