default search action
Andreas Heinemann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Karen Bopp, Andreas Heinemann, Karen Renaud:
"Pass auf!" - Child-Oriented Cyber Safety & Security Educational Content. MuC (Workshopband) 2024 - [c37]Luigi Lo Iacono, Hartmut Schmitt, Denis Feth, Andreas Heinemann:
10. Usable Security und Privacy Workshop - Proposal. MuC (Workshopband) 2024 - 2023
- [c36]Johanna Henrich, Andreas Heinemann, Martin Stiemerling, Fabian Seidl:
Crypto-agile Design and Testbed for QKD-Networks. EICC 2023: 191-192 - [c35]Johanna Henrich, Andreas Heinemann, Alexander Wiesmaier, Nicolai Schmitt:
Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics. ISC 2023: 267-287 - [c34]Luigi Lo Iacono, Hartmut Schmitt, Denis Feth, Andreas Heinemann:
9. Usable Security und Privacy Workshop. MuC (Workshopband) 2023 - [i9]Nico Puhlmann, Alexander Wiesmaier, Andreas Heinemann:
Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review. CoRR abs/2302.00325 (2023) - [i8]Erik Klinger, Alexander Wiesmaier, Andreas Heinemann:
A Review of existing GDPR Solutions for Citizens and SMEs. CoRR abs/2302.03581 (2023) - [i7]Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Andreas Heinemann, Tobias Grasmeyer:
On the State of Crypto-Agility. IACR Cryptol. ePrint Arch. 2023: 487 (2023) - 2022
- [c33]Jan Wohlwender, Rolf Huesmann, Andreas Heinemann, Alexander Wiesmaier:
cryptolib: Comparing and selecting cryptography libraries. EICC 2022: 6-11 - [c32]Julian Hohm, Andreas Heinemann, Alexander Wiesmaier:
Towards a Maturity Model for Crypto-Agility Assessment. FPS 2022: 104-119 - [c31]Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
8. Usable Security und PrivacyWorkshop. MuC (Workshopband) 2022 - [i6]Julian Hohm, Andreas Heinemann, Alexander Wiesmaier:
Towards a maturity model for crypto-agility assessment. CoRR abs/2202.07645 (2022) - [i5]Jan Wohlwender, Rolf Huesmann, Andreas Heinemann, Alexander Wiesmaier:
cryptolib: Comparing and selecting cryptography libraries (long version of EICC 2022 publication). CoRR abs/2203.16370 (2022) - 2021
- [c30]Tim Bender, Rolf Huesmann, Andreas Heinemann:
Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview. ARES 2021: 62:1-62:6 - [c29]Fabian Sterk, Andreas Heinemann:
It is not as simple as that: Playing out password security trainings in order to nudge password changes. EICC 2021: 20-25 - [c28]Nouri Alnahawi, Alexander Wiesmaier, Tobias Grasmeyer, Julian Geißler, Alexander Zeier, Pia Bauspieß, Andreas Heinemann:
On the State of Post-Quantum Cryptography Migration. GI-Jahrestagung 2021: 907-941 - [c27]Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
7. Usable Security und Privacy Workshop. MuC (Workshopband) 2021 - [i4]Alexander Zeier, Alexander Wiesmaier, Andreas Heinemann:
Zur Integration von Post-Quantum Verfahren in bestehende Softwareprodukte. CoRR abs/2102.00157 (2021) - [i3]Alexander Wiesmaier, Nouri Alnahawi, Tobias Grasmeyer, Julian Geißler, Alexander Zeier, Pia Bauspieß, Andreas Heinemann:
On PQC Migration and Crypto-Agility. CoRR abs/2106.09599 (2021) - 2020
- [c26]Rolf Huesmann, Alexander Zeier, Andreas Heinemann, Alexander Wiesmaier:
Zur Benutzbarkeit und Verwendung von API-Dokumentationen. MuC (Workshopband) 2020 - [c25]Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
6. Usable Security und Privacy Workshop. MuC (Workshopband) 2020 - [i2]Rolf Huesmann, Alexander Zeier, Andreas Heinemann, Alexander Wiesmaier:
Zur Benutzbarkeit und Verwendung von API-Dokumentationen. CoRR abs/2007.04983 (2020)
2010 – 2019
- 2019
- [j5]Andreas Heinemann, Tobias Straub:
Datenschutz muss benutzbar sein. Datenschutz und Datensicherheit 43(1): 7-12 (2019) - [c24]Vivian Ives Philipp Erbenich, Daniel Träder, Andreas Heinemann, Meltem Nural:
Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation. HAISA 2019: 179-188 - [c23]Alexander Zeier, Alexander Wiesmaier, Andreas Heinemann:
API Usability of Stateful Signature Schemes. IWSEC 2019: 221-240 - [c22]Rolf Huesmann, Alexander Zeier, Andreas Heinemann:
Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software. MuC (Workshopband) 2019 - [c21]Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
5. Usable Security und Privacy Workshop. MuC (Workshopband) 2019 - 2018
- [c20]Luigi Lo Iacono, Hartmut Schmitt, Andreas Heinemann:
4. Usable Security und Privacy Workshop. MuC (Workshopband) 2018 - [c19]Daniel Träder, Alexander Zeier, Andreas Heinemann:
Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2. Sicherheit 2018: 183-196 - 2017
- [j4]Andreas Heinemann, Karl Rihaczek:
Report. Datenschutz und Datensicherheit 41(1): 49-55 (2017) - [j3]Rüdiger Grimm, Andreas Heinemann:
Alle reden über Blockchain. Datenschutz und Datensicherheit 41(8): 469 (2017) - [c18]Luigi Lo Iacono, Hartmut Schmitt, Andreas Heinemann:
3. Workshop Usable Security: Ziele der Usability und Security ausbalancieren. MuC (Workshopband) 2017 - [c17]Daniel Träder, Alexander Zeier, Andreas Heinemann:
Design and Implementation Aspects of Mobile Derived Identities. Open Identity Summit 2017: 147-152 - [i1]Daniel Träder, Alexander Zeier, Andreas Heinemann:
Design and Implementation Aspects of Mobile Derived Identities. CoRR abs/1707.06505 (2017) - 2016
- [c16]Andreas Heinemann, Steffen Lange, Marian Margraf, Jörg Willomitzer:
Workshop: Nutzerzentrierte Sicherheit - NzS 2016. GI-Jahrestagung 2016: 485-486 - [c15]Sandra Kostic, Andreas Heinemann, Marian Margraf:
Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises. GI-Jahrestagung 2016: 519-527 - [c14]Jörg Willomitzer, Andreas Heinemann, Marian Margraf:
Zur Benutzbarkeit der AusweisApp2. MuC (Workshopband) 2016
2000 – 2009
- 2008
- [j2]Andreas Heinemann:
Online-Rezensionsjournale der Geschichtswissenschaft. ZfBB 55(1): 23-29 (2008) - [c13]Stefan G. Weber, Andreas Heinemann, Max Mühlhäuser:
Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. ARES 2008: 958-964 - [c12]Jussi Kangasharju, Andreas Heinemann:
Incentives for Opportunistic Networks. AINA Workshops 2008: 1684-1689 - [c11]Andreas Heinemann, Jussi Kangasharju, Max Mühlhäuser:
Opportunistic Data Dissemination Using Real-World User Mobility Traces. AINA Workshops 2008: 1715-1720 - [c10]Sebastian Ries, Andreas Heinemann:
Analyzing the Robustness of CertainTrust. IFIPTM 2008: 51-67 - [p3]Andreas Heinemann:
Opportunistic Networks. Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises 2008: 190-210 - [p2]Tobias Straub, Andreas Heinemann:
Security for Ubiquitous Computing. Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises 2008: 337-362 - 2007
- [b1]Andreas Heinemann:
Collaboration in opportunistic networks: rethinking mobile ad-hoc communication. Darmstadt University of Technology, 2007, ISBN 978-3-8364-3106-4, pp. 1- - [j1]Charalampos Z. Patrikakis, Pantelis N. Karamolegkos, Athanasios Voulodimos, Mohd Helmy Abd Wahab, Nik Shahidah Afifi Mohd Taujuddin, Christina Hanif, Linda Pareschi, Daniele Riboni, Stefan G. Weber, Andreas Heinemann, Sen-Ching S. Cheung, Jayahsri Chaudhari, Jithendra K. Paruchuri:
Security and Privacy in Pervasive Computing. IEEE Pervasive Comput. 6(4): 73-75 (2007) - [c9]Stefan G. Weber, Sebastian Ries, Andreas Heinemann:
Inherent Tradeoffs in Ubiquitous Computing Services. GI Jahrestagung (1) 2007: 364-368 - 2006
- [c8]Jussi Kangasharju, Andreas Heinemann:
Incentives for electronic coupon systems. MobiShare@MobiCom 2006: 60-62 - 2005
- [c7]Marco Voss, Andreas Heinemann, Max Mühlhäuser:
A Privacy Preserving Reputation System for Mobile Information Dissemination Networks. SecureComm 2005: 171-181 - [p1]Andreas Heinemann, Max Mühlhäuser:
Spontaneous Collaboration in Mobile Peer-to-Peer Networks. Peer-to-Peer Systems and Applications 2005: 419-433 - [r1]Andreas Görlach, Andreas Heinemann, Wesley W. Terpstra, Max Mühlhäuser:
Location Privacy. Handbook of Algorithms for Wireless Networking and Mobile Computing 2005 - 2004
- [c6]Tobias Straub, Andreas Heinemann:
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation. SAC 2004: 766-773 - [c5]Andreas Heinemann, Johannes Ranke, Tobias Straub:
Zur rechtsverträglichen Technikgestaltung anheind einer M-Commerce-Anwendung. Workshop Mobile Commerce 2004: 162-177 - 2003
- [c4]Andreas Heinemann, Jussi Kangasharju, Fernando Lyardet, Max Mühlhäuser:
iClouds - Peer-to-Peer Information Sharing in Mobile Environments. Euro-Par 2003: 1038-1045 - [c3]Andreas Heinemann, Tobias Straub:
Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen. GI Jahrestagung (2) 2003: 366-371 - 2002
- [c2]Andreas Hartl, Erwin Aitenbichler, Gerhard Austaller, Andreas Heinemann, Tobias Limberger, Elmar Braun, Max Mühlhäuser:
Engineering Multimedia-Aware Personalized Ubiquitous Services. ISMSE 2002: 344-351 - 2000
- [c1]Wolfgang Blochinger, Reinhard Bündgen, Andreas Heinemann:
Dependable High Performance Computing on a Parallel Sysplex Cluster. PDPTA 2000
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 23:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint