Severin Schmidmeier
|
Design of Hacking Challenges on Network Security
|
IDP
|
Lion Steger, Holger Kinkelin
|
2024
|
|
Peter Fam
|
An Analysis of the Effects of Cyber Attacks on the Network Traffic Characteristics of Shop Floor Networks
|
MA
|
Lars Wüstrich, Holger Kinkelin
|
2024
|
|
Jessica Jivanjee
|
Local AI-based Network Anomaly Detection
|
BA
|
Christian Lübben, Holger Kinkelin, Lars Wüstrich
|
2023
|
|
Uros Maletic
|
Evaluating the Impact of Data Pre-Processing to Improve Data Privacy on Machine Learning
|
BA
|
Lars Wüstrich, Holger Kinkelin
|
2023
|
|
Ferdinand List
|
Cooperation and Communication of Swarming UAVs in Disturbed Environments
|
MA
|
Christian Lübben, Holger Kinkelin
|
2023
|
|
Felix Frauenschuh
|
Evaluation of a light-weight approach for device-specific anomaly detection in an IoT network
|
MA
|
Christian Lübben, Holger Kinkelin
|
2023
|
|
Dominik Pham
|
Towards Trustless CA
|
BA, MA
|
Kilian Glas, Holger Kinkelin, Filip Rezabek
|
2023
|
|
Konstantin Kissel
|
Token-based Resource Management - A Currency for Scientific Testbeds
|
BA
|
Holger Kinkelin, Sebastian Gallenmüller, Henning Stubbe
|
2023
|
|
Johannes Pfannschmidt
|
Feasibility Study of Threshold BLS Signature Scheme for Tamper-Resistance Signature Service
|
BA
|
Filip Rezabek, Richard von Seck, Dr. Holger Kinkelin
|
2022
|
|
Andrei Lebedev
|
A Cross-Protocol Blockchain Benchmark System
|
MA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2022
|
|
Johannes Pfannschmidt
|
Feasibility Study of Threshold BLS Signature Scheme for Tamper-Resistance Signature Service
|
BA
|
Filip Rezabek, Richard von Seck, Dr. Holger Kinkelin
|
2022
|
|
Andrei Lebedev
|
A Cross-Protocol Blockchain Benchmark System
|
MA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2022
|
|
Timo Michael Saunus
|
Software-based Security for Intellectual Property and Collaboration
|
MA
|
Richard von Seck, Filip Rezabek, Holger Kinkelin
|
2022
|
|
Justus von der Beek
|
TEE Support for Digital Data Marketplaces
|
IDP
|
Filip Rezabek, Holger Kinkelin, Richard von Seck
|
2022
|
|
Maximilian Haberl
|
Combining feature relevance and clustering for root cause analysis of network anomalies
|
MA
|
Christian Lübben, Holger Kinkelin
|
2022
|
|
Michal Virgovic
|
Analysis and Performance Evaluation of Threshold Decryption Schemes
|
MA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2021
|
|
Kilian Glas
|
Evaluation of Distributed Key Generation Approaches for Threshold ECDSA Signature Schemes
|
MA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2021
|
|
Jan Oesterle
|
Survey on AI-based Methods for Network Anomaly Detection
|
BA
|
Christian Lübben, Dr. Holger Kinkelin, Lars Wüstrich
|
2021
|
|
Michal Virgovic
|
Analysis and Performance Evaluation of Threshold Decryption Schemes
|
MA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2021
|
|
Kilian Glas
|
Evaluation of Distributed Key Generation Approaches for Threshold ECDSA Signature Schemes
|
MA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2021
|
|
Jan Oesterle
|
Survey on AI-based Methods for Network Anomaly Detection
|
BA
|
Christian Lübben, Dr. Holger Kinkelin, Lars Wüstrich
|
2021
|
|
Nadja Schricker
|
Creating Traffic Causality Graphs from Network Captures and Application Logic
|
MA
|
Lars Wüstrich, Christian Lübben, Holger Kinkelin, Marc-Oliver Pahl
|
2021
|
|
Stefan Genchev
|
Online Identification Using the German eID Scheme - Practical Analysis Based on a Certificate Issuance Use Case
|
BA
|
Lars Wüstrich, Holger Kinkelin
|
2021
|
|
Achref Aloui
|
Traffic Causality Graphs for Industrial Networks
|
BA
|
Lars Wüstrich, Christian Lübben, Holger Kinkelin
|
2021
|
|
Florian Wachter
|
Explainable AI for Anomaly Detection
|
MA
|
Christian Lübben, Lars Wüstrich, Holger Kinkelin
|
2021
|
|
Chon Kit Kuok
|
Dockerized Network Experiments Done Right
|
MA
|
Richard von Seck, Holger Kinkelin, Filip Rezabek
|
2021
|
|
Leon Kist
|
Performance Evaluation of Lightweight Transport Layer Security Protocols
|
BA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2020
|
|
Robert Junge
|
A Tamper-Resistant Signature Services Based on Schnorr threshold signing
|
MA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2020
|
|
Sam Katala
|
A Tamper-Resistant Signature Services Based on BLS threshold signing
|
BA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2020
|
|
Bohdan Hirnyak
|
A Tamper-Resistant Signature Services Based on EDCSA threshold signing
|
BA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2020
|
|
Raphael Schleithoff
|
Lightweight Consensus for Distributed Certificate Issuance
|
BA
|
Dr. Holger Kinkelin, Filip Rezabek
|
2020
|
|
Jakob Mezger
|
Performance Analysis of BFT Consensus
|
BA
|
Johannes Schleger, Richard von Seck, Dr. Holger Kinkelin
|
2020
|
|
Twan Schoonen
|
Decentral Trust Infrastructure based on Tamper-Evident Logs
|
MA
|
Johannes Schleger, Richard von Seck, Dr. Holger Kinkelin
|
2020
|
|
Andrei Lebedev
|
Performance Evaluation and Improvement of Hyperledger Iroha
|
IDP
|
Dr. Holger Kinkelin
|
2020
|
|
Mohammed Said Derbel
|
AI-based anomaly classification
|
BA
|
Christian Lübben, Lars Wüstrich, Dr. Holger Kinkelin
|
2020
|
|
Leon Kist
|
Performance Evaluation of Lightweight Transport Layer Security Protocols
|
BA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2020
|
|
Robert Junge
|
A Tamper-Resistant Signature Services Based on Schnorr threshold signing
|
MA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2020
|
|
Sam Katala
|
A Tamper-Resistant Signature Services Based on BLS threshold signing
|
BA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2020
|
|
Bohdan Hirnyak
|
A Tamper-Resistant Signature Services Based on EDCSA threshold signing
|
BA
|
Filip Rezabek, Dr. Holger Kinkelin
|
2020
|
|
Raphael Schleithoff
|
Lightweight Consensus for Distributed Certificate Issuance
|
BA
|
Dr. Holger Kinkelin, Filip Rezabek
|
2020
|
|
Jakob Mezger
|
Performance Analysis of BFT Consensus
|
BA
|
Johannes Schleger, Richard von Seck, Dr. Holger Kinkelin
|
2020
|
|
Twan Schoonen
|
Decentral Trust Infrastructure based on Tamper-Evident Logs
|
MA
|
Johannes Schleger, Richard von Seck, Dr. Holger Kinkelin
|
2020
|
|
Andrei Lebedev
|
Performance Evaluation and Improvement of Hyperledger Iroha
|
IDP
|
Dr. Holger Kinkelin
|
2020
|
|
Mohammed Said Derbel
|
AI-based anomaly classification
|
BA
|
Christian Lübben, Lars Wüstrich, Dr. Holger Kinkelin
|
2020
|
|
Christoph Rudolf
|
Tamper-resistant creation of integrity tokens for trustworthy communication in cyber-physical systems
|
MA
|
Dr. Holger Kinkelin, Richard von Seck
|
2019
|
|
Filip Rezabek
|
A Fault-Proof and Tamper-Resistant Certificate Issuance Process
|
MA
|
Dr. Holger Kinkelin, Dr. Jorge Cuellar
|
2019
|
|
Jan Martin Vogt
|
Feasibility of DLT-based Data Storage and Exchange in Small Scale IoT Networks
|
BA
|
Dr. Holger Kinkelin
|
2019
|
|
Xiaolin Ma
|
Feasibility of OAuth 2.0 based Authentication in a V2V Communication Scenario
|
BA
|
Dr. Holger Kinkelin, Georgi Kehaiov (IC-consult)
|
2019
|
|
Emir Chalgaf
|
An Evaluation of Manageability and Adaptability of Hyperledger Fabric
|
BA
|
Dr. Holger Kinkelin, Johannes Schleger
|
2019
|
|
Markus Oberprieler
|
Designing a Lightweight Alternative to Distributed Ledgers
|
MA
|
Dr. Holger Kinkelin, Johannes Schleger, Max Helm
|
2019
|
|
Daniel Federschmidt
|
Assessment of Private Inference Methods for Deep Neural Networks in Autonomous Driving
|
MA
|
Benedikt Jaeger, Holger Kinkelin, Dr. Sebastian Wirkert
|
2019
|
|
Christoph Rudolf
|
Tamper-resistant creation of integrity tokens for trustworthy communication in cyber-physical systems
|
MA
|
Dr. Holger Kinkelin, Richard von Seck
|
2019
|
|
Filip Rezabek
|
A Fault-Proof and Tamper-Resistant Certificate Issuance Process
|
MA
|
Dr. Holger Kinkelin, Dr. Jorge Cuellar
|
2019
|
|
Jan Martin Vogt
|
Feasibility of DLT-based Data Storage and Exchange in Small Scale IoT Networks
|
BA
|
Dr. Holger Kinkelin
|
2019
|
|
Xiaolin Ma
|
Feasibility of OAuth 2.0 based Authentication in a V2V Communication Scenario
|
BA
|
Dr. Holger Kinkelin, Georgi Kehaiov (IC-consult)
|
2019
|
|
Emir Chalgaf
|
An Evaluation of Manageability and Adaptability of Hyperledger Fabric
|
BA
|
Dr. Holger Kinkelin, Johannes Schleger
|
2019
|
|
Markus Oberprieler
|
Designing a Lightweight Alternative to Distributed Ledgers
|
MA
|
Dr. Holger Kinkelin, Johannes Schleger, Max Helm
|
2019
|
|
Michael Koepferl
|
Development of Security Guidelines for Production Environments
|
MA
|
Dr. Heiko Niedermayer, Dr. Holger Kinkelin, Thorsten Delbrouck
|
2018
|
|
Julian Roos
|
Modelling Organizational Structues for a Federated Distributed Ledger-Based Certificate Management System
|
BA
|
Dr. Holger Kinkelin
|
2018
|
|
Yannick Gehring
|
Incorporating Automated Checks in a Distributed Ledger-Based Certificate Issuance System
|
BA
|
Dr. Heiko Niedermayer, Dr. Holger Kinkelin
|
2018
|
|
Alexander Bauer
|
Evaluation of Distributed Ledger Technology in Automotive Scenarios
|
MA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer
|
2018
|
|
Marc Müller
|
Trustworthy and tamperproof configuration management of networked devices
|
MA
|
Dr. Holger Kinkelin, Cora-Lisa Perner, Dr. Heiko Niedermayer
|
2018
|
|
Anil Karatas
|
Experimental Performance Evaluation of Distributed Private Ledgers in a Virtualized Environment
|
MA
|
Dr. Holger Kinkelin, Benedikt Jaeger
|
2018
|
|
Thomas Maier
|
Exposing Insecure Configurations of Network Session and Permission Graphs
|
MA
|
Simon Bauer, Jonas Jelten, Dr. Holger Kinkelin
|
2018
|
|
Michael Koepferl
|
Development of Security Guidelines for Production Environments
|
MA
|
Dr. Heiko Niedermayer, Dr. Holger Kinkelin, Thorsten Delbrouck
|
2018
|
|
Julian Roos
|
Modelling Organizational Structues for a Federated Distributed Ledger-Based Certificate Management System
|
BA
|
Dr. Holger Kinkelin
|
2018
|
|
Yannick Gehring
|
Incorporating Automated Checks in a Distributed Ledger-Based Certificate Issuance System
|
BA
|
Dr. Heiko Niedermayer, Dr. Holger Kinkelin
|
2018
|
|
Alexander Bauer
|
Evaluation of Distributed Ledger Technology in Automotive Scenarios
|
MA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer
|
2018
|
|
Marc Müller
|
Trustworthy and tamperproof configuration management of networked devices
|
MA
|
Dr. Holger Kinkelin, Cora-Lisa Perner, Dr. Heiko Niedermayer
|
2018
|
|
Anil Karatas
|
Experimental Performance Evaluation of Distributed Private Ledgers in a Virtualized Environment
|
MA
|
Dr. Holger Kinkelin, Benedikt Jaeger
|
2018
|
|
Thomas Maier
|
Exposing Insecure Configurations of Network Session and Permission Graphs
|
MA
|
Simon Bauer, Jonas Jelten, Dr. Holger Kinkelin
|
2018
|
|
Dominik Bitzer
|
Privacy-Preserving and Transparent Access Control for Data Queries in Sensor Networks
|
MA
|
Marcel von Maltitz, Dr. Holger Kinkelin
|
2017
|
|
Max von Tettenborn
|
A Usable and Expressive Schema for Access Control
|
MA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2017
|
|
Jan Felix Hoops
|
Federated Identity and Transaction Management over Blockchain II
|
BA
|
Dr. Heiko Niedermayer, Dr. Holger Kinkelin
|
2017
|
|
Stefanos Georgiou
|
A Trustworthy Process-Tracing System for B2B-Applications based on Blockchain Technology
|
MA
|
Dr. Holger Kinkelin, Sree Harsha Totakura, Dr. Heiko Niedermayer
|
2017
|
|
Valentin Hauner
|
Trustworthy Configuration Management with Distributed Ledgers
|
MA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer
|
2017
|
|
Hendrik Leppelsack
|
Experimental Performance Evaluation of Private Distributed Ledger Implementations
|
MA
|
Dr. Holger Kinkelin, Stefan Liebald
|
2017
|
|
Manuel Ehler
|
Decentralized Feature Processing on Resource-Constrained Devices for Network Anomaly Detection
|
MA
|
Marcel von Maltitz, Stefan Liebald, Simon Bauer, Dr. Holger Kinkelin
|
2017
|
|
Thomas Mauerer
|
Chairman: Software Support for the Management of Student Projects
|
MA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2017
|
|
Dominik Bitzer
|
Privacy-Preserving and Transparent Access Control for Data Queries in Sensor Networks
|
MA
|
Marcel von Maltitz, Dr. Holger Kinkelin
|
2017
|
|
Max von Tettenborn
|
A Usable and Expressive Schema for Access Control
|
MA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2017
|
|
Jan Felix Hoops
|
Federated Identity and Transaction Management over Blockchain II
|
BA
|
Dr. Heiko Niedermayer, Dr. Holger Kinkelin
|
2017
|
|
Stefanos Georgiou
|
A Trustworthy Process-Tracing System for B2B-Applications based on Blockchain Technology
|
MA
|
Dr. Holger Kinkelin, Sree Harsha Totakura, Dr. Heiko Niedermayer
|
2017
|
|
Valentin Hauner
|
Trustworthy Configuration Management with Distributed Ledgers
|
MA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer
|
2017
|
|
Hendrik Leppelsack
|
Experimental Performance Evaluation of Private Distributed Ledger Implementations
|
MA
|
Dr. Holger Kinkelin, Stefan Liebald
|
2017
|
|
Manuel Ehler
|
Decentralized Feature Processing on Resource-Constrained Devices for Network Anomaly Detection
|
MA
|
Marcel von Maltitz, Stefan Liebald, Simon Bauer, Dr. Holger Kinkelin
|
2017
|
|
Thomas Mauerer
|
Chairman: Software Support for the Management of Student Projects
|
MA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2017
|
|
Elias Hazboun
|
Applicability and Performance Analysis of Encrypted Databases for Smart Environments
|
MA
|
Dr. Heiko Niedermayer, Dr. Holger Kinkelin, Marcel von Maltitz
|
2016
|
|
Stefan Smarzly
|
Employment and Evaluation of Secure Multi-Party Computation for Privacy-Preserving Services in Smart Buildings
|
MA
|
Marcel von Maltitz, Dr. Holger Kinkelin
|
2016
|
|
Thomas Mauerer
|
A multi-tenant and privacy-preserving information processing system
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz, Johann Schlamp
|
2016
|
|
Elias Hazboun
|
Applicability and Performance Analysis of Encrypted Databases for Smart Environments
|
MA
|
Dr. Heiko Niedermayer, Dr. Holger Kinkelin, Marcel von Maltitz
|
2016
|
|
Stefan Smarzly
|
Employment and Evaluation of Secure Multi-Party Computation for Privacy-Preserving Services in Smart Buildings
|
MA
|
Marcel von Maltitz, Dr. Holger Kinkelin
|
2016
|
|
Thomas Mauerer
|
A multi-tenant and privacy-preserving information processing system
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz, Johann Schlamp
|
2016
|
|
Andreas Kammerloher
|
Address Resolution and Key Management for a Distributed Communication Underlay
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2015
|
|
Besjan Saidi
|
User controlled privacy settings for Smart Environments
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2015
|
|
Lawrence Krug
|
A system for giving practical advice for energy saving based on sensor information
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz, Johann Schlamp
|
2015
|
|
Arved Baus
|
A Feedback System for Smart Buildings
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz, Johann Schlamp
|
2015
|
|
Jakob Leitmeir
|
Privacy-preserving Data Combination in Smart Environments
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2015
|
|
Benjamin Schöntag
|
Integrating Voice over IP into a privacy friendly network underlay
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
|
2015
|
|
Christian Brosche
|
A modular framework for a collaborative solution for privacy-preserving network communication
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
|
2015
|
|
Sebastian Vogl
|
Privatheitsprobleme von Datenmodellen im intelligenten Gebäudeumfeld
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
|
2015
|
|
Andreas Kammerloher
|
Address Resolution and Key Management for a Distributed Communication Underlay
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2015
|
|
Besjan Saidi
|
User controlled privacy settings for Smart Environments
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2015
|
|
Lawrence Krug
|
A system for giving practical advice for energy saving based on sensor information
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz, Johann Schlamp
|
2015
|
|
Arved Baus
|
A Feedback System for Smart Buildings
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz, Johann Schlamp
|
2015
|
|
Jakob Leitmeir
|
Privacy-preserving Data Combination in Smart Environments
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2015
|
|
Benjamin Schöntag
|
Integrating Voice over IP into a privacy friendly network underlay
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
|
2015
|
|
Christian Brosche
|
A modular framework for a collaborative solution for privacy-preserving network communication
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
|
2015
|
|
Sebastian Vogl
|
Privatheitsprobleme von Datenmodellen im intelligenten Gebäudeumfeld
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
|
2015
|
|
Florian Baumann
|
Anonyme Autorisierung in Smart Environments
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2014
|
|
Benedikt Peter
|
A Privacy-Preserving Architecture for a Smart Building Control System
|
MA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2014
|
|
Sebastian Rückerl
|
Presence Detection using passive WLAN measurements
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer
|
2014
|
|
Sebastian Bendeich
|
Datenmodelle und Konfliktlösung im intelligenten Gebäudeumfeld
|
MA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
|
2014
|
|
Max von Tettenborn
|
Permission-aware Resolution of Human-readable Identifiers and Connectivity Establishment in Smart Environments
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer
|
2014
|
|
Florian Baumann
|
Anonyme Autorisierung in Smart Environments
|
BA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2014
|
|
Benedikt Peter
|
A Privacy-Preserving Architecture for a Smart Building Control System
|
MA
|
Dr. Holger Kinkelin, Marcel von Maltitz
|
2014
|
|
Sebastian Rückerl
|
Presence Detection using passive WLAN measurements
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer
|
2014
|
|
Sebastian Bendeich
|
Datenmodelle und Konfliktlösung im intelligenten Gebäudeumfeld
|
MA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz
|
2014
|
|
Max von Tettenborn
|
Permission-aware Resolution of Human-readable Identifiers and Connectivity Establishment in Smart Environments
|
BA
|
Dr. Holger Kinkelin, Dr. Heiko Niedermayer
|
2014
|
|
Rupert Schneider
|
Resource Depletion und Denial of Service Angriffe auf Xen und KVM
|
BA
|
Holger Kinkelin, Heiko Niedermayer
|
2013
|
|
Michael Dorner
|
Establishing Secure Communication for (Virtual) Machines using Java Smart Cards
|
BA
|
Holger Kinkelin, Nadine Herold
|
2013
|
|
Cornelius Diekmann
|
Security Requirement Modeling as Configuration Management for Scenario-Specific Networks
|
MA
|
Holger Kinkelin, Dr. Heiko Niedermayer
|
2013
|
|
Simon Mittelberger
|
Flexible and resilient services for user-centric identity management and access control
|
MA
|
Holger Kinkelin, Heiko Niedermayer
|
2013
|
|
Wenwen Chen
|
Authentication and Authorization Methods for Resource-Constrained Embedded Device
|
MA
|
Dr. Holger Kinkelin
|
2012
|
|
Benedikt Peter
|
Isolation Quality of Hypervisors
|
BA
|
Holger Kinkelin, Heiko Niedermayer
|
2012
|
|
Simon Stauber
|
Hypervisor-based machine monitoring for securing network infrastructures
|
DA
|
Holger Kinkelin
|
2012
|
|
Martin Jobst
|
Security and Privacy for Personalized Virtual Machine Images using Smart Cards
|
BA
|
Holger Kinkelin, Andreas Müller
|
2012
|
|
Paulo Henrique Azevêdo Filho
|
User-friendly authorization mechanisms in smart building environments
|
GR
|
Holger Kinkelin
|
2012
|
|
Wenwen Chen
|
Authentication and Authorization Methods for Resource-Constrained Embedded Device
|
MA
|
Dr. Holger Kinkelin
|
2012
|
|
Simon Mittelberger
|
A Home Certification Authority for AutHoNe based on Trusted Computing Technology
|
SEP
|
Holger Kinkelin
|
2012
|
|
Blaz Primc
|
Authentisierende Adressierung in Netzwerken
|
DA (University of Ljubljana, Slovenia)
|
Marc-Oliver Pahl, Heiko Niedermayer, Holger Kinkelin, Andreas Müller
|
2010
|
|
Gürcan Karakoc
|
Ein Mechanismus für nutzerzentriertes Identitäts- und Vertrauensmanagement basierend auf sozialen Netzwerken
|
DA
|
Holger Kinkelin, Andreas Müller
|
2010
|
|
Christoph Eunicke
|
Vertrauenswürdige Authentisierung durch die Verbindung von digitalen Ausweisen und TPM-fähigen Geräten
|
Diplomarbeit
|
Andreas Klenk, Holger Kinkelin
|
2009
|
|
Maximilian Vinokurov
|
Ein SIP Auto-Konfigurationsdienst für sicheres VoIP
|
DA
|
Andreas Müller, Holger Kinkelin
|
2009
|
|
Spaska Ivancheva
|
Ein wissensbasierter SIP-Konfigurationsdienst für NAT-Traversal
|
SEP
|
Andreas Müller, Holger Kinkelin
|
2009
|
|
Andreas Weis
|
Bluetooth in future Home Networks
|
SEP
|
Andreas Müller, Holger Kinkelin
|
2009
|
|
Simon Stauber
|
Vertrauenswuerdiges Network Access Control basierend auf Integritaetsmesswerten mit EAP-TNC
|
SEP
|
Holger Kinkelin, Corinna Schmitt
|
2009
|
|
Michael Bothmann
|
Vertrauenswuerdige Auslieferung von Zertifikaten fuer Network Access Control mit EAP-(T)TLS
|
SEP
|
Holger Kinkelin, Corinna Schmitt
|
2009
|
|