Seminar on Internet Technologies (Summer 2010): Difference between revisions

Jump to navigation Jump to search
(Created page with '== Details == {{CourseDetails |credits=120h, 4 ECTS |module=M.Inf.122/222: Seminar Telematik I/II ''-or-'' B.Inf.204/205: Proseminar I/II |ta=[http://www.net.informatik.uni-goett…')
 
Line 27: Line 27:


== Topics ==
== Topics ==
TBA


The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you.
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Topic'''
|{{Hl2}} |'''Topic advisor'''
|{{Hl2}} |'''Initial readings'''
|-
| <strike>Securing Media Transport Protocols</strike>
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]
|-
| State-of-the-art and deployment scenarios for IPv6
| Mayutan Arumaithurai
| [http://www.cisco.com/en/US/docs/ios/solutions_docs/ipv6/IPv6dswp.html]
|-
| <strike>Traffic Localization in P2P Networks</strike>
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]
|-
| Modern Authentication Systems on the example of MS Geneva
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]
|-
| Distributed Hash Tables - Usage, properties and future development
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://en.wikipedia.org/wiki/Distributed_hash_table]
|}


==Workflow==
==Workflow==

Navigation menu