Thomas Mundt
Thomas Mundt
Verified email at
Cited by
Cited by
JXTA: a technology facilitating mobile peer-to-peer networks
N Maibaum, T Mundt
International Mobility and Wireless Access Workshop, 7-13, 2002
Indoor and outdoor positioning in mobile environments a review and some investigations on wlan positioning
R Bill, C Cap, M Kofahl, T Mundt
Geographic Information Sciences 10 (2), 91-98, 2004
Authcoin: validation and authentication in decentralized networks
B Leiding, CH Cap, T Mundt, S Rashidibajgan
arXiv preprint arXiv:1609.04955, 2016
Who refuses to wash hands? privacy issues in modern house installation networks
T Mundt, F Krüger, T Wollenberg
2012 Seventh International Conference on Broadband, Wireless Computing …, 2012
Security in building automation systems-a first analysis
T Mundt, P Wickboldt
2016 International Conference On Cyber Security And Protection Of Digital …, 2016
Location dependent digital rights management
T Mundt
10th IEEE Symposium on Computers and Communications (ISCC'05), 617-622, 2005
Using XML to semi-automatically derive user interfaces
A Mueller, T Mundt, W Lindner
Proceedings Second International Workshop on User Interfaces in Data …, 2001
Two methods of authenticated positioning
T Mundt
Proceedings of the 2nd ACM international workshop on Quality of service …, 2006
Bitcoin—das Open-Source-Geld
CH Cap
HMD Praxis der Wirtschaftsinformatik 49 (1), 84-93, 2012
Where are my colleagues and why? Tracking multiple persons in indoor environments
F Krüger, M Kasparick, T Mundt, T Kirste
2014 International Conference on Intelligent Environments, 190-197, 2014
Classroom response systems in the wild: technical and non-technical observations
J Vetterick, M Garbe, A Dähn, CH Cap
International Journal of Interactive Mobile Technologies (iJIM) 8 (1), 21-25, 2014
Suitability of cloud computing for scientific data analyzing applications; an empirical study
A Angabini, N Yazdani, T Mundt, F Hassani
2011 International Conference on P2P, Parallel, Grid, Cloud and Internet …, 2011
Forensic analysis of home automation systems
T Mundt, A Dähn, HW Glock
7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014), 2014
Securely connecting IoT devices with LoRaWAN
A Gladisch, S Rietschel, T Mundt, J Bauer, J Goltz, S Wiedenmann
2018 Second World Conference on Smart Trends in Systems, Security and …, 2018
General Security Considerations of LoRaWAN Version 1.1 Infrastructures
T Mundt, A Gladisch, S Rietschel, J Bauer, J Goltz, S Wiedenmann
Proceedings of the 16th ACM International Symposium on Mobility Management …, 2018
How much is a byte? A survey of costs for mobile data transmission
T Mundt
Proceedings of the winter international synposium on Information and …, 2004
Adjusting the power consumption of a solar energy powered wireless network node in accordance with weather forecasts
T Mundt
Novel Algorithms and Techniques In Telecommunications, Automation and …, 2008
Network topology analysis in the cloud
T Mundt, J Vetterick
Proceedings on the International Conference on Internet Computing (ICOMP), 1, 2011
An intrusion detection system with home installation networks
T Mundt, A Dähn, S Sass
International Journal of Computing and Digital Systems 3 (01), 2014
Spontane Verknüpfung von Diensten-Wiederverwendung und Kostenersparnis
T Mundt
Diplomica GmbH, 2003
The system can't perform the operation now. Try again later.
Articles 1–20