Abgeschlossene Promotionsverfahren

Dipl.-Ing. Thomas Pöppelmann - 07.2015

Efficient Implementation of Ideal Lattice-Based Cryptography

1. examiner: Güneysu, Tim
2. examiner: Verbauwhede, Ingrid

[pdf.-Datei]

Dipl.-Inform. Ralf Zimmermann - 07.2015

Cryptanalysis using Reconfigurable Hardware for High-Performance Computing

1. examiner: Paar, Chris­tof
2. examiner: Lange, Tanja

[pdf.-Datei]

Dipl.-Inform. Ralf Zimmermann - 07.2015

1. examiner: Paar, Chris­tof
2. examiner: Lange, Tanja

[PDF]

M.Sc. Zhang Zheng - 07.2015

Conception and implementation of a reference architecture for an easier development of MDSD generaor systems with the focus on enterprise applications

1. examiner: Balzert, Helmut
2. examiner: Eisenecker, Ulrich

[pdf.-Datei]

M.Sc. Marc Kührer - 07.2015

Large-Scale Analysis of Network-based Threats and Potential Countermeasures

1. examiner: Holz, Thorsten
2. examiner: Rieck, Konrad

[pdf.-Datei]

Dipl.-Ing. Alexander Broy - 07.2015

Active vibration damping in optimized powertrain structures of variable speed wind energy systems

1. examiner: Sourkounis , Constantinos
2. examiner: Rehtanz, Christian

3. examiner: Wenske, Jan

[pdf.-Datei]

M. Sc. Ashar Javed - 07.2015

On Cross-Site Scipting, Fallback Authentication and Privacy in Web Application

1. examiner: Schwenk, Jörg
2. examiner: Posegga, Joachim

[pdf.-Datei]

Dipl.-Ing Sebastian Gergen - 07.2015

Classification of audio sources using ad-hoc microphone arrays

1. examiner: Martin, Rainer
2. examiner: Doclo, Simon

[pdf.-Datei]

Dipl.-Ing. Steffen Schulz - 07.2015

Trusted Channels and Roots of Trust in Distributed Embedded Systems

1. examiner: Sadeghi, Ahmad-Reza
2. examiner: Varadharajan, Vijay

[pdf.-Datei]

Dipl.-Ing. Florian Feldmann - 07.2015

Binding Credentials-Securing SSO Authentication-

1. examiner: Schwenk, Jörg
2. examiner: Pöpper, Christina

[pdf.-Datei]
Page: