Dr. Alexander Wiesmaier

View Alexander Wiesmaier's profile on LinkedIn Dr. Alexander Wiesmaier

Quick Links

o    Short CV

o    Publications

o    Peer Review

o    Teaching

Short CV

o    Since 2011      Lead Architect / Senior Researcher at AGT International, Darmstadt, Germany

System architecture, privacy, and cyber security

Areas: smart infrastructures, internet of things, and cloud computing

o    Since 2001      Occasional Sideline Freelance Work, Darmstadt, Germany

IT security standards and applications

Functions: consultant, lecturer, developer

o    2008 – 2011    Postdoctoral Researcher at TU Darmstadt, Darmstadt, Germany

Cryptographic protocols and applications

Areas: e-identities, e-signatures, long-term security, usable security, and cloud security

o    2006 – 2008    Analyst at Safelayer Secure Communications S.A., Barcelona, Spain

Digital identification and trust management

Areas: PKI, HSM, information systems, and workflow control

o    2001 – 2006    Research Associate at TU Darmstadt, Darmstadt, Germany

IT security infrastructures and cryptography

Areas: applied cryptography and software architecture

Degree: Doktor-Ingenieur (≈ PhD in engineering)

o    1995 – 2001    Studies of Computer Science at TU Darmstadt, Darmstadt, Germany

Areas: cryptography, software engineering, and communication networks

Degree: Diplom-Informatiker (≈ Master of Computer Science)

o    Certifications  Cloud Security: Certificate of Cloud Security Knowledge V2.1 (CCSK)

Enterprise Architecture: The Open Group Architecture Framework (TOGAF) 9.1 Level 2

SCADA Security: Certified SCADA Security Architect (CSSA)

Scrum: Scrum Alliance Certifed ScrumMaster (CSM)

o    Languages      German: native speaker

                                    English: business fluent

Spanish: business fluent

Catalan: basic knowledge

Publications

Journals, Conferences, and Workshops

o    E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier, and P. Kikiras.
On the Security & Privacy of Internet of Things architectures and systems.
In International Workshop on Secure Internet of Things 2015 (SIoT 2015), 2015. [accepted, to appear]

o    S. Funke, J. Daubert, A. Wiesmaier, P. Kikiras, and M. Mühlhäuser.
End-2-End Privacy Architecture for IoT.
In Third IEEE Conference on Communications and Network Security (CNS 2015), 2015. [accepted, to appear]

o    A. Lukavchenko, H. Rajasekaran, A. Wiesmaier, and P. Kikiras.
Decision-making criteria for cyber security adoption: Internet of Things privacy and cyber security issues.
In 10th Future Security Conference 2015 (Future Security 2015), Berlin, Germany, September 2015. [accepted, to appear]

o    V. Gazis, M. Görtz, M. Huber, A. Leonardi, K. Mathioudakis, A. Wiesmaier, F. Zeiger, and E. Vasilomanolakis.
A Survey of Technologies for the Internet of Things.
In International Wireless Communications & Mobile Computing Conference (IWCMC 2015), Dobrovnik, Croatia, August 2015. [accepted, to appear]

o    J. Daubert, A. Wiesmaier, and P. Kikiras.
A View on Privacy & Trust in IoT.
IEEE ICC 2015 – First Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (SPIC), pages 2665–2670, London, UK, June 2015

o    V. Gazis, C. Garcia Cordero, E. Vasilomanolakis, P. Kikiras, and A. Wiesmaier.
Security Perspectives for Collaborative Data Acquisition in the Internet of Things.
Internet of Things. IoT Infrastructures – IoT360 / SaSeIoT 2014, number 151 in LNICST, pages 271–282. Springer, Rome, Italy, June 2015

o    M. Vigil, J. Buchmann, D. Cabarcas, C. Weinert, and A. Wiesmaier.
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
Computer & Security (Journal), 50:16–32, May 2015.

o    V. Gazis, M. Görtz, M. Huber, A. Leonardi, K. Mathioudakis, A. Wiesmaier, and F. Zeiger.
IoT: Challenges, Projects, and Architectures.
In 18th International ICIN Conference on Innovations in Services, Networks and Clouds, February 2015.

o    A. Leonardi, K. Mathioudakis, A. Wiesmaier, and F. Zeiger.
Towards the Smart Grid: Substation Automation, Architecture and Technologies.
Advances in Electrical Engineering (Journal), Article ID 896296 (13 pages), August 2014.

o    J. Braun, J. Buchmann, C. Mullan, and A. Wiesmaier.
Long term confidentiality: a survey.
Designs, Codes and Cryptography, pages 459–478, June 2014.

o    A. Chandra-Sekaran, A. Wiesmaier, and A. Hessler.
Multi domain information architecture and modeling for smart grids.
IEEE PES Innovative Smart Grid Technologies Conference (ISGT) ASIA, November 2013.

o    M. Horsch, D. Hühnlein, C. Breitenstrom, T. Wieland, B. Biallowons, D. Petrautzki, S. Potzernheim, J. Schmölz, A. Wesner, T. Wich, and A. Wiesmaier.
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Translated title: The Open eCard App for more transparency, trust, and usability for electronic authentication.
13.
Deutscher IT-Sicherheitskongress, May 2013.

o    P. Ebinger, J. L. Hernández Ramos, P. Kikiras, M. Lischka, and A. Wiesmaier.
Privacy for Smart Metering Ecosystems.
In First Open EIT ICT Labs Workshop on Smart Grid Security (SmartGrid-Sec12), volume 7823 of LNCS. Springer, April 2013.

o    J. Braun, A. Wiesmaier, and J. Buchmann.
On the Security of Encrypted Secret Sharing.
46th Hawaii International Conference on System Sciences (HICSS-46), January 2013.

o    J. Braun, A. Hülsing, M. Vigil, and A. Wiesmaier
How to Avoid the Breakdown of Public Key Infrastructures – Forward Secure Signatures for Certificate Authorities
9th European PKI Workshop: Research and Applications, September 2012

o    M. Horsch, J. Braun, A. Wiesmaier, J. Schaaf, and C. Baumöller
Verteilte Dienstnutzung mit dem neuen Personalausweis
Translated title: Distributed service usage with the new German electronic ID card
D-A-CH Security 2012, pages 186–197, September 2012

o    F. Kiefer, A. Wiesmaier, and C. Fritz
Practical Security in E-Mail Applications
The 2012 International Conference on Security and Management (SAM’12), pages 138–144, July 2012

o    J. Braun, M. Horsch, and A. Wiesmaier
iPIN and mTAN for Secure eID Applications
In Information Security Practice and Experience, pages 259 – 276, April 2012

o    D. Hühnlein, D. Petrautzki, J. Schmölz, T. Wich, M. Horsch, T. Wieland, J. Eichholz, A. Wiesmaier, J. Braun, F. Feldmann, S. Potzernheim, J. Schwenk, C. Kahlo, A. Kühne, and H. Veit
On the design and implementation of the Open eCard App
In N. Suri and M. Waidner, editors, Sicherheit 2012 — Schutz und Zuverlässigkeit, pages 95 – 110, March 2012

o    J. Braun, M. Horsch, A. Wiesmaier, and D. Hühnlein
Mobile Authentisierung und Signatur
Translated title: Mobile authentication und signature
In D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, pages 32 – 43, September 2011


o    C. Esteve, C. Macapuna, M. Magalhaes, F. Verdi, and A. Wiesmaier
In-packet Bloom filters: Design and networking applications
Computer Networks – The International Journal of Computer and Telecommunications Networking, 55(6):1364–1378, April 2011

o    A. Wiesmaier, M. Horsch, J. Braun, F. Kiefer, D. Hühnlein, F. Strenzke, and J. Buchmann
An efficient mobile PACE implementation
In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’11, pages 176–185, New York, NY, USA, March 2011.

o    L. Langer, A. Wiesmaier, and J. Buchmann
Secure Long-Term Record Keeping in the Public Sector
eGovernment Review, 7:14–15, January 2011

o    J. Buchmann, A. Wiesmaier, D. Hühnlein, J. Braun, M. Horsch, F. Kiefer, and F. Strenzke
Towards a mobile eCard Client
In Tagungsband zum 13.
KryptoTag, page 4, December 2010

o    L. Langer and A. Wiesmaier
Der Lifetime eSafe – ein sicheres elektronisches Schließfach
Translated title: The Lifetime eSafe – a secure electronic lock box
In Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), page 155, April 2010

o    D. Hühnlein, U. Korte, L. Langer, and A. Wiesmaier
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
In 3rd International Conference on New Technologies, Mobility and Security (NTMS), pages 1–5. IEEE Press, December 2009. DOI 10.1109/NTMS.2009.5384830

o    L. Langer, A. Schmidt, and A. Wiesmaier
From Student Smartcard Applications to the German Electronic Identity Card
In Dan Remenyi, editor, 9th European Conference on e-Government – ECEG, pages 430–435. ACI, June 2009

o    M. Lippert, E. Karatsiolis, A. Wiesmaier, and J. Buchman
Life-Cycle Management of X.509 Certificates Based on LDAP Directories
Journal of Computer Security, 14(5):419–439, September 2006

o    S. Fritsch, E. Karatsiolis, M. Lippert, A. Wiesmaier, and J. Buchmann
Towards Secure Electronic Workflows
In Third European PKI Workshop: Theory and Practice (EuroPKI 2006), volume 4043 of Lecture Notes in Computer Science, pages 154–168. Springer-Verlag, June 2006

o    U. Steinhof, A. Wiesmaier, and R. Araújo
The State of the Art in DNS Spoofing
In Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS’06), 174–189, June 2006

o    D. große Osterhues, A. Wiesmaier, and R. Araújo
On Securing Unix Systems with Smart Cards
In Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS’06) pages 143–157, June 2006

o    J. Frommer, A. Wiesmaier, and R. Araújo
On Firewalls and Tunneling
In Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS’06), pages 190–205, June 2006

o    R. Araújo, R. Custodio, A. Wiesmaier, and T. Takagi
An Electronic Scheme for the Farnel Paper-Based Voting Protocol
In Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS’06), pages 78–91, June 2006

o     U. Rauchschwalbe, A. Wiesmaier, C. Ludwig, and J. Buchmann
Digital signierte Wägeresultate – Neue Wege in der Sicherung eichfähiger Messwerte
Translated title: Digitally signed weight values – new ways in securing calibratable measured values
WDM – Wägen, Dosieren + Mischen, 3:23–27, May 2006

o    A. Wiesmaier, U. Rauchschwalbe, C. Ludwig, B. Henhapl, M. Ruppert, and J. Buchmann
Intrinsically Legal-For-Trade Objects by Digital Signatures
In Jana Dittmann, editor, Sicherheit 2006: Sicherheit – Schutz und Zuverlässigkeit, Lecture Notes in Informatics, pages 218–221. Koellen Druck + Verlag GmbH, Bonn, February 2006

o    M. Lippert, E. Karatsiolis, A. Wiesmaier, and J. Buchmann
Directory Based Registration in Public Key Infrastructures
In Zhou et al., editor, The 4th International Workshop for Applied PKI (IWAP’05), pages 17–32. IOS Press, September 2005

o    A. Wiesmaier, E. Karatsiolis, M. Lippert, and J. Buchmann
The Workshop – Implementing Well Structured Enterprise Applications
In 2005 International Conference on Software Engineering Research and Practice (SERP)’05, volume 2, pages 947–953, June 2005

o    A. Wiesmaier, M. Lippert, E. Karatsiolis, G. Raptis, and J. Buchmann
An Evaluated Certification Services System for the German National Root CA – Legally Binding and Trustworthy Transactions in E-Business and E-Government
In 2005 International Conference on E-Business, Enterprise Information Systems, and Outsourcing (EEE’05), pages 103–108, June 2005

o    A. Wiesmaier, E. Karatsiolis, M. Lippert, and J. Buchmann
Outflanking and Securely Using the PIN/TAN System
In 2005 International Conference on Security and Management (SAM’05), pages 313–319, June 2005

o    E. Karatsiolis, M. Lippert, and A. Wiesmaier
Planning for Directory Services in Public Key Infrastructures
In H. Federrath, editor, Sicherheit 2005, volume P-62 of Lecture Notes in Informatics, pages 349–360. Koellen Druck + Verlag GmbH, Bonn, April 2005

o    E. Karatsiolis, M. Lippert, A. Wiesmaier, A. Pitaev, M. Ruppert, and J. Buchmann
Towards a Flexible Intra-Trustcenter Management Protocol
The Third International Workshop for Applied PKI (IWAP’04), available via CoRR cs.CR/0411067, October 2004

o    A. Wiesmaier, M. Lippert, and E. Karatsiolis
The Key Authority – Secure Key Management in Hierarchical Public Key Infrastructures
In International Conference on Security and Management (SAM’04), pages 89–93, June 2004

o    E. Karatsiolis, M. Lippert, and A. Wiesmaier
Using LDAP Directories for Management of PKI Processes
First European PKI Workshop: Research and Applications (EuroPKI’04), volume 3093 of Lecture Notes in Computer Science, pages 126–134. Springer- Verlag, June 2004

Patents

o    P. Kikiras, A. Leonardi, K. Mathioudakis, and A. Wiesmaier.
A Method for enabling diferentiated privacy using object masking.
Patent application fled in August 2015, under examination

o    A. Wiesmaier, J. Braun, and M. Horsch
Method and System for Secure Access of a First Computer to a Second Computer
Patent family EP2639997, September 2013, Filed March 2012, granted September 2014.

o    C. Baumöller, J. Schaaf, M. Horsch, A. Wiesmaier, and J. Braun
Identification element-based authentication and identification with decentralised service use
Patent family EP2600270, June 2013. Filed December 2011, under examination

o    A. Ahrens, J. Buchmann, F. Heinold, E. Mues, A. Vossl, R. Araújo, and A. Wiesmaier
Electronic Online Voting System
Patent family EP2087472, February 2006. Filed August 2006, under examination

o    U. Rauchschwalbe, B. Henhapl, A. Wiesmaier, C. Ludwig, M. Ruppert, and J. Buchmann
Method and device for digital protection of measured values
Patent family EP1450144, August 2004. Filed February 2003, under examination

Books and Theses

o    J. Buchmann, E. Karatsiolis, and A. Wiesmaier
Introduction to Public Key Infrastructures
Textbook for advanced university/college courses. Springer-Verlag Berlin Heidelberg, 2013. ISBN: 978-3-642-40656-0

o    A. Wiesmaier
Secure Private Key Management in Adaptable Public Key Infrastructures
PhD thesis, Cryptography and Computer Algebra Group, Technische Universität Darmstadt. Mensch und Buch Verlag Berlin, 2009. ISBN: 978-3-86664-646-9

o    A. Wiesmaier
FlexiTrust CA – Ein flexibles, skalierbares und dynamisch erweiterbares Trustcenter
Translated title: FlexiTrust CA – A flexible, scalable, and dynamically adaptable trust center
Diplomarbeit (Master’s thesis), Cryptography and Computer Algebra Group, Technische Universität Darmstadt, January 2001

Technical Reports & Others

o    I. Barreira, T. Gustavsson, A. Wiesmaier, C. Galan, and S. Gorniak
Mitigating the impact of security incidents – Guidelines for trust services providers – Part 3
ENISA Guidelines, December 2013

o    I. Barreira, T. Gustavsson, A. Wiesmaier, C. Galan, and S. Gorniak
Risk assessment – Guidelines for trust services providers – Part 2
ENISA Guidelines, December 2013

o    I. Barreira, T. Gustavsson, A. Wiesmaier, C. Galan, and S. Gorniak
Security framework – Guidelines for trust services providers – Part 1
ENISA Guidelines, December 2013

o    J. Braun, A. Hülsing, and A. Wiesmaier
Schlanke Infrastrukturen für den digitalen Rechtsverkehr
Translated title: Lean Infrastructures for digital legal relations
Technical Report TUD-CS-2012-0295, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, December 2012

o    M. Horsch, J. Braun, and A. Wiesmaier
Decoupling Authentication from the Usage of Services
Technical Report TUD-CS-2012-0305, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, October 2012

o    A. Wiesmaier, M. Horsch, D. Hühnlein, and J. Braun
Reader as an electronic identification
Patent family WO2012056049, May 2012. Filed November 2010, withdrawn July 2013

o    A. Wiesmaier, M. Horsch, D. Hühnlein, F. Kiefer, and F. Strenzke
Effiziente Ausführung des PACE Protokolls
Translated title: Efficient execution of the PACE protocol
Patent family DE102010050194, May 2012, Filed November 2010, rejected June 2012

o    E. Klieme, L. Strick, W. Wunderlich, J. Braun, and A. Wiesmaier
Der elektronische Safe als vertrauenswürdiger Cloud Service
Translated title: The electronic safe as trustworthy Cloud service
Technical Report TUD-CS-2011-0279, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, September 2011

o    M. Horsch, J. Braun, and A. Wiesmaier
Mobile eID application for the German identity card
Technical Report TUD-CS-2011-2918, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, August 2011

o    L. Langer, A. Schmidt, and A. Wiesmaier
Innovative Personalausweisanwendungen – Mehrwert des elektronischen Personalausweises jenseits von Portal- und Formularanwendungen
Translated title: Innovative applications for ID cards – added value of the German electronic ID card beyond portals und forms
Technical Report TI-02/10, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, June 2010

o    J. Buchmann and A. Wiesmaier
Eine kurze Geschichte der Schlüssel
Translated title: A short story of keys
360° – Fachmagazin für das Management im öffentlichen Sektor, 17:21–23, May 2010

o    E. Karatsiolis, L. Langer, A. Schmidt, E. Tews, and A. Wiesmaier
Cryptographic application scenarios
Technical Report TI-01/10, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, January 2010

o    L. Langer, A. Schmidt, and A. Wiesmaier
Projekt Campuspilot – Akzeptanzbericht
Translated title: Project Campuspilot – acceptance report
Technical Report TI-02/09, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, August 2009

o    L. Langer and A. Wiesmaier
Langfristige Sicherheit am Beispiel eines virtuellen Tresors
Translated title: Long-term security at the example of a virtual safe
Technical Report TI-01/09, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, June 2009

o    P. Rexroth and A. Wiesmaier
MAVA – Modular Security for Distributed Applications
Technical Report TI-01/07, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, July 2007

o    R. Araújo, A. Wiesmaier, and J. Buchmann
The T-Vote Protocol
Technical Report TI-03/06, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, August 2006

o    A. Wiesmaier
The State of the Art in Algorithmic Encryption
Technical Report TI-01/06, Cryptography and Computer Algebra Group, Technische Universität Darmstadt, January 2006

Peer Review

Journals

o    EIS Elsevir Information Systems
http://www.journals.elsevier.com/information-systems/

o    IJCDS International Journal of Computing and Digital Systems
http://www.ijcds.com/

o    AJSCA Aloy Journal of Soft Computing and Applications
http://ajsca.org/

Conferences, Workshops, and Books

o    MobiApps 2015 The 2nd International Workshop on Mobile Applications
http://www.themobiapps.org/2015/

o    OID 2015 Open Identity Summit 2015
http://openidentity.eu/

o    CyCon 2015 International Conference on Cyber Confict - Student Awards
https://ccdcoe.org/cycon/

o    ICDS 2014 The Eighth International Conference on Digital Society
http://www.iaria.org/conferences2014/ICDS14.html

o    Privacy Book 2014 Privacy in a Digital, Networked World – Technologies, Implications and Solutions
http://www.springer.com/computer/database+management+&+information+retrieval/book/978-3-319-08469-5

o    ISIEA 2014 IEEE Symposium on Industrial Electronics Applications
http://isiea2014.isiea.org/

o    OID 2014 Open Identity Summit 2014
http://openidentity.eu/

o    ISCAIE 2014 2014 IEEE Symposium on Computer Applications & Industrial Electronics
http://myies.org/iscaie2014/

o    ICDS 2014 The Eighth International Conference on Digital Society
http://www.iaria.org/conferences2014/ICDS14.html

o    OID 2013 Open Identity Summit 2013
http://openidentity.eu/

o    ISCI 2013 2013 IEEE Symposium on Computers & Informatics
http://isci2013.mypels.org/

o    ICSCSR 2013 1st International Symposium for ICS & SCADA Cyber Security 2013
http://www.ics-csr.com/

o    ICDS 2013 The Seventh International Conference on Digital Society
http://www.iaria.org/conferences2013/ICDS13.html

o    ICDS 2012 The Sixth International Conference on Digital Society
http://www.iaria.org/conferences2012/CfPICDS12.html

o    ISCAIE 2012 IEEE Symposium on Computer Applications & Industrial Electronics
http://www.mypels.org/iscaie2012/

o    perspeGKtive 2011 Sichere Informationstechnologie für das Gesundheitswesen von morgen
Translated title: Secure Information Technology for the Health Care System of Tomorrow
http://www.perspegktive.de/

o    DICCDI 2011 Privacy and Identity Management for Communities – Communities for Privacy and Identity Management
http://www.informatik2011.de/

o    perspeGKtive 2010 Sichere Informationstechnologie für das Gesundheitswesen von morgen
Translated title: Secure Information Technology for the Health Care System of Tomorrow
http://www.perspegktive.de/

o    BIOSIG 2009 Biometrics and Electronic Signatures – Research and Applications
http://www.cast-forum.de/workshops/programm/119

Teaching

o    Cryptography; lecture; Darmstadt University of Applied Sciences; Darmstadt; Germany; winter term 2016

o    Bachelor Practical Course; seminar; Darmstadt University of Applied Sciences; Darmstadt; Germany; winter term 2016

o    IT Security; lecture; Darmstadt University of Applied Sciences; Darmstadt; Germany; summer term 2016

o    Bachelor Preparatory Course; seminar; Darmstadt University of Applied Sciences; Darmstadt; Germany; summer term 2016

o    Cryptography; lecture; Darmstadt University of Applied Sciences; Darmstadt; Germany; winter term 2015

o    Internet of Things Cryptography; student research project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2015

o    Internet of Things Cryptography; student research project; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2014

o    Internet of Things Cryptography; student research project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2014

o    Public Key Infrastructures; lecture; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2014

o    Selected Topics in IT Security; lecture series; Baden-Wuerttemberg Cooperative State University Mosbach; Mosbach; Germany; summer term 2011

o    CryptoBird; practical course; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2011

o    Public Key Infrastructures; lecture; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2011

o    Electronic Identities; student research project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2010

o    ThunderCrypt; practical course; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2010

o    Mobile Authentication with the German eID Card (MONA); final year project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2010

o    Mobile Authentication Scenarios; project course; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2010

o    Public Key Infrastructures; practical course; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2010

o    Efficient Implementation of PACE and EAC for Mobile Devices; final year project; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2010

o    Public Key Infrastructures; lecture; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2010

o    Mobile European Citizen Card Application; practical course; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2009

o    The Infrastructure of the German eHealth Card; final year project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2009

o    Economic Benefit of the German eID Card; final year project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2009

o    The German eID Card in E-Commerce; final year project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2009

o    Public Key Infrastructures; lecture; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2009

o    An Overview of the German eHealth Card; student research project; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2009

o    MobilePACE; final year project; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2009

o    Improved user guidance for handling secure connections in web browsers; final year project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2008

o    Writing Scientific Papers; student research project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2005

o    Theoretical Foundations of Computer Science; lecture assistance; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2005

o    IT-Security; practical course; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2005

o    IT-Security; practical course; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2004

o    Public Key Infrastructures; student research project; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2004

o    IT-Security; practical course; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2004

o    IT-Security; practical course; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2003

o    Software for Automatic Generation of IEEE829 Test Documentation; final year project; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2003

o    Public Key Infrastructures; lecture assistance; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2003

o    IT-Security; practical course; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2003

o    Attack on PIN/TAN-Based Online-Banking; final year project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2002

o    Design and Implementation of the FlexiTrust CA as Java Enterprise Application; final year project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2002

o    Public Key Infrastructures; student research project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2002

o    Concepts for Secure Key Management; final year project; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2002

o    Modern Programming with Java-Frameworks; student research project; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2002

o    IT-Security; practical course; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2002

o    Analysis of Practical Applications of AspectJ with Examples from FlexiTrust Trust Center Software; final year project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2001

o    Public Key Infrastructures; student research project; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2001

o    IT-Security; practical course; Technische Universität Darmstadt; Darmstadt; Germany; winter term 2001

o    Introduction to Cryptography; lecture assistance; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2001

o    Concept and Realization of a PKI Based on FlexiTrust; final year project; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2001

o    IT Security; practical course; Technische Universität Darmstadt; Darmstadt; Germany; summer term 2001

o    Computer Technology II; lecture assistance; Technische Universität Darmstadt; Darmstadt; Germany; winter term 1998

o    Computer Technology I; lecture assistance; Technische Universität Darmstadt; Darmstadt; Germany; winter term 1997

Impressum