Survey on location privacy in pervasive computing A Görlach, A Heinemann, WW Terpstra Privacy, security and trust within the context of pervasive computing, 23-34, 2005 | 98 | 2005 |
iclouds–peer-to-peer information sharing in mobile environments A Heinemann, J Kangasharju, F Lyardet, M Mühlhäuser Euro-Par 2003 Parallel Processing: 9th International Euro-Par Conference …, 2003 | 79 | 2003 |
A privacy preserving reputation system for mobile information dissemination networks M Voss, A Heinemann, M Muhlhauser First International Conference on Security and Privacy for Emerging Areas in …, 2005 | 61 | 2005 |
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation T Straub, A Heinemann Proceedings of the 2004 ACM symposium on Applied computing, 766-773, 2004 | 51 | 2004 |
Collaboration in opportunistic networks A Heinemann Technische Universität Darmstadt, 2007 | 42 | 2007 |
Security and privacy in pervasive computing C Patrikakis, P Karamolegkos, A Voulodimos, MH Abd Wahab, ... IEEE Pervasive Computing 6 (4), 73-75, 2007 | 33 | 2007 |
Analyzing the robustness of CertainTrust S Ries, A Heinemann IFIP International Conference on Trust Management, 51-67, 2008 | 29 | 2008 |
Engineering multimedia-aware personalized ubiquitous services A Hartl, E Aitenbichler, G Austaller, A Heinemann, T Limberger, E Braun, ... Fourth International Symposium on Multimedia Software Engineering, 2002 …, 2002 | 27 | 2002 |
Ad hoc collaboration and information services using information clouds A Heinemann, J Kangasharju, F Lyardet, M Mühlhäuser Proceedings of the 3rd Workshop on Applications and Services in Wireless …, 2003 | 23 | 2003 |
Incentives for electronic coupon systems J Kangasharju, A Heinemann Proceedings of the 1st international workshop on Decentralized resource …, 2006 | 21 | 2006 |
On the state of crypto-agility N Alnahawi, N Schmitt, A Wiesmaier, A Heinemann, T Grasmeyer Cryptology ePrint Archive, 2023 | 17 | 2023 |
Opportunistic data dissemination using real-world user mobility traces A Heinemann, J Kangasharju, M Muhlhauser 22nd International Conference on Advanced Information Networking and …, 2008 | 17 | 2008 |
On the state of post-quantum cryptography migration N Alnahawi, A Wiesmaier, T Grasmeyer, J Geißler, A Zeier, P Bauspieß, ... Gesellschaft für Informatik, Bonn, 2021 | 11 | 2021 |
Inherent tradeoffs in ubiquitous computing services SG Weber, S Ries, A Heinemann Gesellschaft für Informatik e. V., 2007 | 11 | 2007 |
Towards a maturity model for crypto-agility assessment J Hohm, A Heinemann, A Wiesmaier International Symposium on Foundations and Practice of Security, 104-119, 2022 | 10 | 2022 |
API Usability of Stateful Signature Schemes A Zeier, A Wiesmaier, A Heinemann Advances in Information and Computer Security: 14th International Workshop …, 2019 | 10 | 2019 |
Towards an architecture for balancing privacy and traceability in ubiquitous computing environments SG Weber, A Heinemann, M Mühlhäuser 2008 Third International Conference on Availability, Reliability and …, 2008 | 10 | 2008 |
Incentives for opportunistic networks J Kangasharju, A Heinemann 22nd International Conference on Advanced Information Networking and …, 2008 | 9 | 2008 |
Zur rechtsverträglichen Technikgestaltung anhand einer m-commerce-Anwendung A Heinemann, J Ranke, T Straub Mobile Economy–Transaktionen, Prozesse, Anwendungen und Dienste, Proceedings …, 2004 | 9 | 2004 |
Dependable High Performance Computing on a Parallel Sysplex Cluster. W Blochinger, R Bündgen, A Heinemann PDPTA, 2000 | 9 | 2000 |