Abgeschlossene Promotionsverfahren

M. Sc. Elif Bilge Kavun - 02.2015

Resource-efficient Cryptography for Ubiquitous Computing

1. examiner: Paar, Chris­tof
2. examiner: Rechberger, Christian

[pdf.-Datei]

M. Sc. Tilmann Frosch - 01.2015

On Mitigation of Client-Side Attacks and Protection of Private Data

1. examiner: Holz, Thorsten
2. examiner: Schwenk, Jörg

[pdf.-Datei]

Dipl.-Math. Florian Bergsma geb. Giesen - 11.2014

Modeling and analyzing cryptographic real-world Protocols

1. examiner: Schwenk, Jörg
2. examiner: Boyd, Colin

[pdf.-Datei]

Dipl.-Ing. André Bergner - 11.2014

Investigation of ignition aids for automotive HID lamps

1. examiner: Awakowicz, Peter
2. examiner: Mentel, Jürgen

[pdf.-Datei]

Dipl.-Inform. Sebastian Noth - 11.2014

A Multi-User driving Simulator for Studying Human driving

1. examiner: Schöner, Gregor
2. examiner: Würtz, Rolf P.

[pdf.-Datei]

Dipl.-Ing. Stephan Holtrup - 10.2014

Characterization of HID lamps in microwave operation compared to alternating current operation

1. examiner: Awakowicz, Peter
2. examiner: Mentel, Jürgen

[pdf.-Datei]

Dipl.-Inform. Johannes Stallkamp - 10.2014

Framework for the Development, Evaluation and Analysis of Computer Vision Application in the Context of Advanced Driver Assistance Systems

1. examiner: Schöner, Gregor
2. examiner: Würtz, Rolf P.

[pdf.-Datei]

M.Sc. Daehyun Strobel - 10.2014

Novel Application for Side-Channel Analysis of Embedded Microcontrollers

1. examiner: Paar, Chris­tof
2. examiner: Oswald, Elisabeth

[pdf.-Datei]

Dipl.-Ing. Jie Fang - 09.2014

Modeling and Control Approach for Doubly-fed Induction Machine with Consideration of Slot Harmonics

1. examiner: Staudt , Volker
2. examiner: Soter, Stefan

[pdf.-Datei]

Dipl.-Ing. Andreas Gornik - 09.2014

Design and Analysis of a Hardware-Countermeasure against Side-Channel Attacks

1. examiner: Oehm, Jürgen
2. examiner: Paar, Chris­tof

[pdf.-Datei]
Page: