Abgeschlossene Abschlussarbeiten

Philipp Morgner

Analyzing Location Privacy in GSM Mobile Telephony using Software Radios

Christina Pöpper - 11.2014

Mohamad Nehme

Timed Revocation of User Data

Christina Pöpper - 08.2014

Katharina Kohls

Trustworthy and Acknowledged Hidden Data Transmission for Voice-over-IP Covert Channels

Christina Pöpper - 06.2014

Christine Zahn

Construction of a Demonstrator for Man-in-the-Middle Attacks on GSM

Christina Pöpper - 12.2014

Benedikt Echelmeyer

Implementierung eines Steganographie-Verfahrens für den VoIP-Client Skype

Katharina Kohls - 08.2015

Florian Rüchel

Enabling High-Latency Privacy for the Tor Network

Kai Jansen - 08.2015

David Rupprecht

Development of a Framework for Applied LTE Security Analysis

Kai Jansen - 11.2015

Sebastian Brenza

Infrastructure- and Client-side Authentication in Eduroam

Christina Pöpper - 03.2015

Thomas Welskopf

Implementation of a Real-Time GPS Spoofing Detection System

Kai Jansen -

Phil Knüfer

Experimental Analysis of an Automotive GPS Tracker (Telematics)

Kai Jansen -

Tedongmo Djou Brice Ulrich

Mixing Against Confirmation Attacks in Tor

Katharina Kohls -

[Shadow] [Tor]

Mehdi Dhib

Attacks on Satellite-based Localization Systems Using a Multi-Antenna Setup

Kai Jansen -

Sebastian Rosin

On the Feasibility of Software Side-Channel Attacks Against Fingerprint Matching Algorithms

Markus Dürmuth, Theodor Schnitzler - 01.2018

Johanna Jupke

Concepts of Qualified Electronic Signatures as Remote Electronic Signatures - Usability of a Prototype Implementation

Markus Dürmuth, Theodor Schnitzler - 12.2016

Florian Farke

User Expectations of Digital Forgetting

Markus Dürmuth, Theodor Schnitzler - 10.2017

Page: