JXTA: a technology facilitating mobile peer-to-peer networks N Maibaum, T Mundt International Mobility and Wireless Access Workshop, 7-13, 2002 | 99 | 2002 |
Indoor and outdoor positioning in mobile environments a review and some investigations on wlan positioning R Bill, C Cap, M Kofahl, T Mundt Geographic Information Sciences 10 (2), 91-98, 2004 | 78 | 2004 |
Authcoin: validation and authentication in decentralized networks B Leiding, CH Cap, T Mundt, S Rashidibajgan arXiv preprint arXiv:1609.04955, 2016 | 73 | 2016 |
Security in building automation systems-a first analysis T Mundt, P Wickboldt 2016 International Conference On Cyber Security And Protection Of Digital …, 2016 | 48 | 2016 |
Who refuses to wash hands? privacy issues in modern house installation networks T Mundt, F Krüger, T Wollenberg 2012 Seventh International Conference on Broadband, Wireless Computing …, 2012 | 32 | 2012 |
Two methods of authenticated positioning T Mundt Proceedings of the 2nd ACM international workshop on Quality of service …, 2006 | 29 | 2006 |
Location dependent digital rights management T Mundt 10th IEEE Symposium on Computers and Communications (ISCC'05), 617-622, 2005 | 23 | 2005 |
Where are my colleagues and why? Tracking multiple persons in indoor environments F Krüger, M Kasparick, T Mundt, T Kirste 2014 International Conference on Intelligent Environments, 190-197, 2014 | 21 | 2014 |
Securely connecting IoT devices with LoRaWAN A Gladisch, S Rietschel, T Mundt, J Bauer, J Goltz, S Wiedenmann 2018 Second World Conference on Smart Trends in Systems, Security and …, 2018 | 20 | 2018 |
Using XML to semi-automatically derive user interfaces A Mueller, T Mundt, W Lindner Proceedings Second International Workshop on User Interfaces in Data …, 2001 | 18 | 2001 |
General security considerations of LoRaWAN version 1.1 infrastructures T Mundt, A Gladisch, S Rietschel, J Bauer, J Goltz, S Wiedenmann Proceedings of the 16th ACM International Symposium on Mobility Management …, 2018 | 12 | 2018 |
Suitability of cloud computing for scientific data analyzing applications; an empirical study A Angabini, N Yazdani, T Mundt, F Hassani 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet …, 2011 | 12 | 2011 |
Forensic analysis of home automation systems T Mundt, A Dähn, HW Glock 7th Workshop on hot topics in privacy enhancing technologies (HotPETs 2014), 2014 | 11 | 2014 |
Using machine learning to find anomalies in field bus network traffic M Peters, J Goltz, S Wiedenmann, T Mundt Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2019 | 7 | 2019 |
Honeypots for threat intelligence in building automation systems J Bauer, J Goltz, T Mundt, S Wiedenmann 2019 Computing, Communications and IoT Applications (ComComAp), 242-246, 2019 | 5 | 2019 |
How much is a byte?: a survey of costs for mobile data transmission T Mundt ACM International Conference Proceeding Series 58, 1-6, 2004 | 5 | 2004 |
Designing and implementing a benchmark collection for attack simulation in field bus systems S Wiedenmann, T Mundt, J Goltz 2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018 | 4 | 2018 |
Network topology analysis in the cloud T Mundt, J Vetterick Proceedings on the International Conference on Internet Computing (ICOMP), 1, 2011 | 4 | 2011 |
Adjusting the power consumption of a solar energy powered wireless network node in accordance with weather forecasts T Mundt Novel Algorithms and Techniques In Telecommunications, Automation and …, 2008 | 4 | 2008 |
Spontane Verknüpfung von Diensten-Wiederverwendung und Kostenersparnis T Mundt Diplomica GmbH, 2003 | 2 | 2003 |