Thomas Mundt
Thomas Mundt
Verified email at
Cited by
Cited by
JXTA: a technology facilitating mobile peer-to-peer networks
N Maibaum, T Mundt
International Mobility and Wireless Access Workshop, 7-13, 2002
Indoor and outdoor positioning in mobile environments a review and some investigations on wlan positioning
R Bill, C Cap, M Kofahl, T Mundt
Geographic Information Sciences 10 (2), 91-98, 2004
Authcoin: validation and authentication in decentralized networks
B Leiding, CH Cap, T Mundt, S Rashidibajgan
arXiv preprint arXiv:1609.04955, 2016
Security in building automation systems-a first analysis
T Mundt, P Wickboldt
2016 International Conference On Cyber Security And Protection Of Digital …, 2016
Who refuses to wash hands? privacy issues in modern house installation networks
T Mundt, F Krüger, T Wollenberg
2012 Seventh International Conference on Broadband, Wireless Computing …, 2012
Two methods of authenticated positioning
T Mundt
Proceedings of the 2nd ACM international workshop on Quality of service …, 2006
Location dependent digital rights management
T Mundt
10th IEEE Symposium on Computers and Communications (ISCC'05), 617-622, 2005
Where are my colleagues and why? Tracking multiple persons in indoor environments
F Krüger, M Kasparick, T Mundt, T Kirste
2014 International Conference on Intelligent Environments, 190-197, 2014
Securely connecting IoT devices with LoRaWAN
A Gladisch, S Rietschel, T Mundt, J Bauer, J Goltz, S Wiedenmann
2018 Second World Conference on Smart Trends in Systems, Security and …, 2018
Using XML to semi-automatically derive user interfaces
A Mueller, T Mundt, W Lindner
Proceedings Second International Workshop on User Interfaces in Data …, 2001
General security considerations of LoRaWAN version 1.1 infrastructures
T Mundt, A Gladisch, S Rietschel, J Bauer, J Goltz, S Wiedenmann
Proceedings of the 16th ACM International Symposium on Mobility Management …, 2018
Suitability of cloud computing for scientific data analyzing applications; an empirical study
A Angabini, N Yazdani, T Mundt, F Hassani
2011 International Conference on P2P, Parallel, Grid, Cloud and Internet …, 2011
Forensic analysis of home automation systems
T Mundt, A Dähn, HW Glock
7th Workshop on hot topics in privacy enhancing technologies (HotPETs 2014), 2014
Using machine learning to find anomalies in field bus network traffic
M Peters, J Goltz, S Wiedenmann, T Mundt
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2019
How much is a byte?: a survey of costs for mobile data transmission
T Mundt
ACM International Conference Proceeding Series 58, 1-6, 2004
Honeypots for threat intelligence in building automation systems
J Bauer, J Goltz, T Mundt, S Wiedenmann
2019 Computing, Communications and IoT Applications (ComComAp), 242-246, 2019
Designing and implementing a benchmark collection for attack simulation in field bus systems
S Wiedenmann, T Mundt, J Goltz
2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018
Network topology analysis in the cloud
T Mundt, J Vetterick
Proceedings on the International Conference on Internet Computing (ICOMP), 1, 2011
Adjusting the power consumption of a solar energy powered wireless network node in accordance with weather forecasts
T Mundt
Novel Algorithms and Techniques In Telecommunications, Automation and …, 2008
Spontane Verknüpfung von Diensten-Wiederverwendung und Kostenersparnis
T Mundt
Diplomica GmbH, 2003
The system can't perform the operation now. Try again later.
Articles 1–20