Seminar on Internet Technologies (Winter 2011/2012): Difference between revisions

Line 59: Line 59:
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf]
|-
| Understanding Android Security
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4768655&tag=1]
|-
| Security in Near Field Communication (NFC)
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]
|-
|-
| Malware propagation in mobile phone networks
| Malware propagation in mobile phone networks
55

edits