Theses and Projects: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 2: | Line 2: | ||
* [[Proxy Mobile IP Implementation and Evaluation in IEEE 802.11 Networks]] | * [[Proxy Mobile IP Implementation and Evaluation in IEEE 802.11 Networks]] | ||
* [[Design and Implementation of a Sandbox Environment on a Mobile Phone]] | * [[Design and Implementation of a Sandbox Environment on a Mobile Phone]] | ||
* [[Implementation and Evaluation of a Decentralized Authentication System based on Social Groups]] | * [[Implementation and Evaluation of a Decentralized Authentication System based on Social Groups]] | ||
* Trust and Reputation systems: | * Trust and Reputation systems: | ||
Line 8: | Line 7: | ||
** [[Robustness analysis and real world deployments]] | ** [[Robustness analysis and real world deployments]] | ||
** many more, just [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler get in contact or drop in] | ** many more, just [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler get in contact or drop in] | ||
* Network Coordinate Systems: | |||
** [[Implementation and Deployment of Phoenix Network Coordinate System]] | |||
** [[Securing Phoenix Network Coordinate System]] | |||
<noinclude> | <noinclude> |