UCS Publications

2016 onward.

A complete list of Andreas Heinemann’s publications can be found in his Google Scholar profile.

(2025). Simulation-based Software Leakage Evaluation for the RISC-V Platform. Accepted for publication at the 28th Information Security Conference (ISC).

Cite ISC 2025 ISC Accepted Papers

(2025). DemoQuanDT: a carrier-grade QKD network. Journal of Optical Communications and Networking.

Cite DOI

(2024). How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation Study. NordiCHI ‘24: Proceedings of the 13th Nordic Conference on Human-Computer Interaction.

Cite DOI

(2024). Pass auf! - Child-Oriented Cyber Safety & Security Educational Content. Mensch und Computer 2024 - Workshopband, Gesellschaft für Informatik e.V..

Cite DOI PDF

(2024). IT-Sicherheit aus Nutzerinnen- und Nutzersicht. Nomos Verlagsgesellschaft.

Cite Nomos

(2024). PMMP-PQC Migration Management Process. Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference.

Cite DOI

(2024). On Criteria and Tooling for Cryptographic Inventories. Sicherheit 2024, Gesellschaft für Informatik e.V..

Cite DOI PDF

(2024). Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey.

Cite

(2023). Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics. Information Security, ISC 2023. Lecture Notes in Computer Science, vol 14411. Springer, Cham.

Cite DOI

(2023). Crypto-Agile Design and Testbed for QKD-Networks. EICC ‘23: European Interdisciplinary Cybersecurity Conference, Stavanger, Norway, Juni 14-15, 2023.

Cite DOI Poster (pdf)

(2023). Towards a maturity model for crypto-agility assessment. Foundations and Practice of Security. FPS 2022. Lecture Notes in Computer Science, vol 13877. Springer, Cham.

Cite DOI Related Website

(2022). cryptolib: comparing and selecting cryptography libraries. EICC ‘22: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, Juni 15-16, 2022.

Cite

(2022). Towards a maturity model for crypto-agility assessment. Technical Report / Preprint.

Cite arXiv DL PDF

(2022). On the State of Crypto Agility. 18. Deutscher IT-Sicherheitskongress.

Cite

(2021). It is not as simple as that: Playing out password security trainings in order to nudge password changes. EICC ‘21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021.

Cite DOI URL

(2021). On the State of Post-Quantum Cryptography Migration. INFORMATIK 2021 — Workshop: Post-Quanten Kryptographie in der Praxis (PQKP).

Cite DOI PDF

(2021). Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte. Tagungsband zum 17. Deutschen IT-Sicherheitskongress.

Cite Preprint

(2021). Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview. ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021.

Cite DOI

(2021). IT-Sicherheit aus Nutzerinnen- und Nutzersicht. Nomos Verlagsgesellschaft.

Cite

(2020). Zur Benutzbarkeit und Verwendung von API-Dokumentationen. Mensch und Computer 2020 - Workshopband, Gesellschaft für Informatik e.V..

Cite DOI PDF

(2019). Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation. Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019).

Cite PDF

(2019). Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software. Mensch und Computer 2019 - Workshopband, Gesellschaft für Informatik e.V.

Cite DOI PDF

(2019). Datenschutz muss benutzbar sein. Datenschutz und Datensicherheit, volume 43.

Cite DOI

(2019). API Usability of Stateful Signature Schemes. Advances in Information and Computer Security - IWSEC 2019.

Cite DOI

(2018). Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2. Sicherheit 2018 - Proceedings.

Cite DOI PDF

(2017). Design and Implementation Aspects of Mobile Derived Identities. *Open Identity Summit 2027 - Proceedings.

Cite PDF

(2017). Alle reden über Blockchain. Datenschutz und Datensicherheit.

Cite DOI

(2016). Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises. Informatik 2016. Bonn: Gesellschaft für Informatik e.V.

Cite PDF

(2016). Security-Management-as-a-Service für die öffentliche Verwaltung. D·A·CH Security 2016 Proceedings - SECMGT Workshop.

Cite PDF Program

(2016). AnonDrop - Räumlich begrenzte anonyme Informationsverbreitung. D·A·CH Security 2016 Proceedings.

Cite PDF Program

(2016). Zur Benutzbarkeit der AusweisApp2. Mensch und Computer 2016 – Workshopband. Aachen: Gesellschaft für Informatik e.V.

Cite DOI PDF