Forschung

Forschungsinteressen

  • User-Centered Security
  • Security for Ubiquitous Computing
  • Opportunistic Networks
  • Privacy-Enhancing Technologies (PET)

Publikationen

  • Willomitzer, J., Heinemann, A. & Margraf, M., (2016). Zur Benutzbarkeit der AusweisApp2. In: Weyers, B. & Dittmar, A. (Hrsg.), Mensch und Computer 2016 – Workshopband. Aachen: Gesellschaft für Informatik e.V..
  • Gutsche, M. and Heinemann, A. (2011). Verbesserung der Usability im unternehmensweiten Informationsmanagement. In Studium Duale, Band 16. DHBW Mannheim.
  • Heinemann, A. and Straub, T. (2010). Opportunistic Networks as an Enabling Technology for Mobile Word-of-Mouth Advertising. In Pousttchi, K. and Wiedemann, D., editors, Handbook of Research on Mobile Marketing Management, chapter 13. IGI Global.
  • Straub, T. and Heinemann, A. (2009). Security for Ubiquitous Computing. In Ang, C. S. and Zaphiris, P., editors, Human Computer Interaction: Concepts, Methodologies, Tools, and Applications, chapter 26. IGI Global.
  • Heinemann, A. (2008). Opportunistic Networks. In Mühlhäuser, M. and Gurevych, I., editors, Ubiquitous Computing Technology for Real Time Enterprises, chapter 9. Information Science Reference.
  • Heinemann, A., Kangasharju, J., and Mühlhäuser, M. (2008). Opportunistic Data Dissemination Using Real-World User Mobility Traces. In 1st IEEE Intl. Workshop on Opportunistic Networking (WON-08).
  • Kangasharju, J. and Heinemann, A. (2008). Incentives for Opportunistic Networks. In 1st IEEE Intl. Workshop on Opportunistic Networking (WON-08).
  • Ries, S. and Heinemann, A. (2008). Analyzing the Robustness of CertainTrust. In Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2008).
  • Straub, T. and Heinemann, A. (2008). Security for Ubiquitous Computing. In Mühlhäuser, M. and Gurevych, I., editors, Ubiquitous Computing Technology for Real Time Enterprises, chapter 15. Information Science Reference.
  • Weber, S. G. and Heinemann, A. (2008). Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments. In Int’l Workshop on Privacy and Assurance (WPA-08).
  • Aitenbichler, E. and Heinemann, A. (2007). Proximity-Based Authentication for Windows Domains. In UbiComp 2007 Workshop Proceedings, pages 475–480.
  • Heinemann, A. (2007). Collaboration in Opportunistic Networks. PhD thesis, Technische Universität Darmstadt.
  • Patrikakis, C., Karamolegkos, P., Voulodimos, A., Wahab, M. H. A., Taujuddin, N. S. A. M., Hanif, C., Pareschi, L., Riboni, D., Weber, S. G., Heinemann, A., ching Samson Cheung, S., Chaudhari, J., and Paruchuri, J. K. (2007). Security and privacy in pervasive computing. IEEE Pervasive Computing, 6(4):73–75.
  • Weber, S. G., Ries, S., and Heinemann, A. (2007). Inherent Tradeoffs in Ubiquitous Computing Services. In INFORMATIK 2007 - Informatik trifft Logistik, Band 1 der Proceedings zur 37. Jahrestagung der Gesellschaft für Informatik GI e.V., volume P109 of LNI, pages 364–368, Bremen, Germany. GI.
  • Görlach, A., Heinemann, A., Terpstra, W. W., and Mühlhäuser, M. (2006). Location Privacy. In Boukerche, A., editor, Handbook of Algorithms for Wireless Networking and Mobile Computing, Computer and Information Science Series, pages 393–411. Chapman & Hall/CRC.
  • Kangasharju, J. and Heinemann, A. (2006). Incentives for Electronic Coupon Systems. In Proceedings of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing and Networking, pages 60–62. ACM Press.
  • Görlach, A., Heinemann, A., and Terpstra, W. W. (2005). Survey on Location Privacy in Pervasive Computing. In Robinson, P., Vogt, H., and Wagealla, W., editors, Privacy, Security and Trust within the Context of Pervasive Computing, The Kluwer International Series in Engineering and Computer Science, pages 23–34. Kluwer Academic Publishers.
  • Heinamann, A. and Mühlhäuser, M. (2005). Spontaneous Collaboration in Mobile Peer-to-Peer Networks, volume 3485 of Lecture Notes in Computer Science, chapter 25, pages 419–433. Springer.
  • Voss, M., Heinemann, A., and Mühlhäuser, M. (2005). A Privacy Preserving Reputation System for Mobile Information Dissemination Networks. In First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), pages 171–181. IEEE.
  • Heinemann, A., Mühlhäuser, M., Terpstra, W. W., and Aitenbichler, E. (2004a). Allgegenwärtige Rechner: Eine neue Dimension der IT-Sicherheitsproblematik. Thema Forschung 1/2004: IT-Sicherheit, pages 100–105.
  • Heinemann, A., Ranke, J., and Straub, T. (2004b). Zur rechtsverträglichen Technikgestaltung anhand einer M-Commerce-Anwendung. In Pousttchi, K. and Turowski, K., editors, Mobile Economy - Transaktionen, Prozesse, Anwendungen und Dienste, Proceedings zum 4. Workshop Mobile Commerce, volume P-42 of LNI, pages 162–177, Augsburg, Deutschland. GI.
  • Straub, T. and Heinemann, A. (2004). An Anonymous Bonus Point System For Mobile Commerce Based On Word-Of-Mouth Recommendation. In Liebrock, L. M., editor, Applied Computing 2004. Proceedings of the 2004 ACM Symposium on Applied Computing, pages 766–773, New York, NY, USA. ACM Press.
  • Heinemann, A., Kangasharju, J., Lyardet, F., and Mühlhäuser, M. (2003a). Ad Hoc Collaboration and Information Services Using Information Clouds. In Braun, T., Golmie, N., and Schiller, J., editors, Proceedings of the 3rd Workshop on Applications and Services in Wireless Networks, (ASWN 2003), pages 233–242, Bern, Switzerland. Institute of Computer Science and Applied Mathematics, University of Bern.
  • Heinemann, A., Kangasharju, J., Lyardet, F., and Mühlhäuser, M. (2003b). iClouds – Peer-to-Peer Information Sharing in Mobile Environments. In Kosch, H., Böszörményi, L., and Hellwagner, H., editors, Euro-Par 2003. Parallel Processing, 9th International Euro-Par Conference, volume 2790 of Lecture Notes in Computer Science, pages 1038–1045, Klagenfurt, Austria. Springer.
  • Heinemann, A. and Straub, T. (2003). Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen. In Dittrich, K. R., König, W., Oberweis, A., Rannenberg, K., and Wahlster, W., editors, INFORMATIK 2003 - Innovative Informatikanwendungen, Band 2, Beiträge der 33. Jahrestagung der Gesellschaft für Informatik e.V. (GI), volume 35 of LNI, pages 366–371, Frankfurt am Main, Deutschland. GI.
  • Hartl, A., Aitenbichler, E., Austaller, G., Heinemann, A., Limberger, T., Braun, E., and Mühlhäuser, M. (2002). Engineering Multimedia-Aware Personalized Ubiquitous Services. In IEEE Fourth International Symposium on Multimedia Software Engineering (MSE’02), pages 344–351.
  • Mühlhäuser, M., Aitenbichler, E., Austaller, G., Hartl, A., Heinemann, A., and Trompler, C. (2002). Towards Personalized Ubiquitous Computing Services. Technical Report TK-01/02, Fachbereich Informatik, TU Darmstadt.
  • Blochinger, W., Bündgen, R., and Heinemann, A. (2000). Dependable High Performance Computing on a Parallel Sysplex Cluster. In Arabnia, H. R., editor, Proc. of the Intl. Conf. on Parallel and Distributed Processing Techniques and Applications (PDPTA 2000), volume 3, pages 1627–1633, Las Vegas, NV, U.S.A. CSREA Press.