Now showing items 1-20 of 26

    • A comparison of TCP congestion control algorithms in 10G networks 

      Beitrag zu einer Konferenz
      Lukaseder, Thomas; Bradatsch, Leonard; Erb, Benjamin; Van der Heijden, Rens W.; Kargl, Frank (Universität Ulm, The Institute of Electrical and Electronics Engineers (IEEE), 2016-11)
      The increasing availability of 10G Ethernet network capabilities challenges existing transport layer protocols. As 10G connections gain momentum outside of backbone networks, the choice of appropriate TCP congestion control ...
    • A metric to assess the trustworthiness of certificate authorities 

      Abschlussarbeit (Master; Diplom)
      Heinl, Michael P. (Universität Ulm, 2019-03-14)
      In the recent past, there has been a series of security incidents leading to increasing concern regarding the trust model currently employed by public key infrastructures. One of the key criticisms is the architecture’s ...
    • A privacy-preserving decentralized storage with payments based on a blockchain 

      Dissertation
      Kopp, Henning Johannes Gustav (Universität Ulm, 2019-06-11)
      Recently, the paradigm of cloud storage has seen wide acceptance in industry and for personal use. One of its core principles is to outsource storage, such that users can be billed flexibly by their actual demand. However, ...
    • A structure-free aggregation framework for vehicular ad hoc networks 

      Beitrag zu einer Konferenz
      Schoch, Elmar; Dietzel, Stefan; Bako, Boto Zsolt; Kargl, Frank
      One of the major difficulties for cooperative, decentralized information dissemination in vehicular networks is the heavily varying node density, which can lead to capacity issues of the wireless channel when many vehicles ...
    • Advanced data centre traffic management on programmable ethernet switch infrastructure 

      Abschlussarbeit (Master; Diplom)
      Tokmakov, Kamil; Sarker, Mitalee (Universität Ulm, 2019-07-17)
      As an infrastructure to run high performance computing (HPC) applications, which represent parallel computations to solve large problems in science or business, cloud computing offers to the tenants an isolated virtualized ...
    • Analyzing attacks on cooperative adaptive cruise control (CACC) 

      Beitrag zu einer Konferenz
      Van der Heijden, Rens W.; Lukaseder, Thomas; Kargl, Frank (Universität Ulm, Institute of Electrical and Electronics Engineers (IEEE), 2017-11)
      Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between ...
    • Combining safety and security threat modeling to improve automotive penetration testing 

      Abschlussarbeit (Master; Diplom)
      Wolf, Michael (Universität Ulm, 2019-04-03)
      Newer technologies like connectivity and autonomy in the automotive sector increases the need for stronger security and for its evaluation penetration tests. In order to focus the tests first on the most critical possible ...
    • Design of the Secure Execution PUF-based Processor (SEPP) 

      Konferenzband
      Unterstein, Florian; Kleber, Stephan; Matousek, Matthias; Kargl, Frank; Slomka, Frank; Hiller, Matthias
      A persistent problem with program execution is its vulnerability to code injection attacks. Equally unsolved is the susceptibility of software to reverse engineering, which undermines code confidentiality. We propose an ...
    • Design und Implementierung eines zuverlässigen und verfügbaren (NoSQL) Datenbanksystems 

      Abschlussarbeit (Master; Diplom)
      Hauser, Christopher B. (Universität Ulm, 2017-06-27)
      Die Verwendung von Datenbanksystemen für die Datenhaltung in Anwendungen ist populär, da der Implementierungsaufwand für die Manipulation und Speicherung zu persistierender Daten hinfällig wird. Die Wahl des Datenbanksystems ...
    • Efficient information dissemination in VANETs 

      Dissertation
      Bako, Boto (Universität Ulm, 2016-12-20)
      VANETs represent a promising approach to realize novel applications by exchanging information between vehicles over a wireless medium. Primarily safety applications are counted among them, which intend to increase the road ...
    • Effiziente broadcast Datenübertragung in mobilen Ad-hoc-Netzwerken : ein intelligentes Protokoll für intelligente Umgebungen 

      Dissertation
      Pregizer, Florian (Universität Ulm, 2019-02-18)
      Ein wichtiger Baustein zur Realisierung von “umgebende Intelligenz” sind effiziente und gleichzeitig zuverlässige Datenübertragungsprotokolle. Die Verteilung von Daten via Broadcast besitzt ein großes Potential Kommunikation ...
    • Enabling retroactive computing through event sourcing 

      Abschlussarbeit (Master; Diplom)
      Müller, Michael (Universität Ulm, 2016-09-30)
      Event sourcing is a style of software architecture wherein state altering operations to an application are captured as immutable events. Each event is appended to an event log, with the current state of a system derived ...
    • Enhanced position verification for VANETs using subjective logic 

      Beitrag zu einer Konferenz
      Van der Heijden, Rens W.; Kargl, Frank; Al-Momani, Ala'a; Abu-Sharkh, Osama M. F. (Universität Ulm, arXiv, 2016-03-31)
      The integrity of messages in vehicular ad-hoc networks has been extensively studied by the research community, resulting in the IEEE 1609.2 standard, which provides typical integrity guarantees. However, the correctness ...
    • Enhanced position verification for VANETs using subjective logic 

      Beitrag zu einer Konferenz
      Van der Heijden, Rens W.; Kargl, Frank; Abu-Sharkh, Osama M. F.; Al-Momani, Ala'a (Universität Ulm, Institute of Electrical and Electronics Engineers, 2016-08-10)
      The integrity of messages in vehicular ad-hoc networks has been extensively studied by the research community, resulting in the IEEE 1609.2 standard, which provides typical integrity guarantees. However, the correctness ...
    • Mandatory enforcement of privacy policies using trusted computing principles 

      Beitrag zu einer Konferenz
      Kargl, Frank; Schaub, Florian; Dietzel, Stefan
      Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation ...
    • Misbehavior detection in cooperative intelligent transport systems 

      Dissertation
      Van der Heijden, Rens Wouter (Universität Ulm, 2018-12-20)
      Automobile accidents are one of the major causes of death in the Western world. In previous decades, automobile manufacturers and researchers have investigated a broad spectrum of solutions to this challenge. Within this ...
    • Multi-source fusion operations in subjective logic 

      Beitrag zu einer Konferenz
      Van der Heijden, Rens Wouter; Kopp, Henning; Kargl, Frank (Universität Ulm, 2018-06-10)
      The purpose of multi-source fusion is to combine information from more than two evidence sources, or subjective opinions from multiple actors. For subjective logic, a number of different fusion operators have been proposed, ...
    • Multi-source fusion operations in subjective logic 

      Beitrag zu einer Konferenz
      Kopp, Henning; Kargl, Frank; Van der Heijden, Rens Wouter (Universität Ulm, 2018-07-13)
      This is the presentation of our paper, multi-source fusion operations in subjective logic.
    • Proceeding of the 3rd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2015) 

      Konferenzband
      Frank, Raphael; Sommer, Christoph; Kargl, Frank; Dietzel, Stefan; Van der Heijden, Rens W. (Universität Ulm, 2017-09-04)
      On March 19th and 20th, twenty motivated researchers working on inter-vehicular communication (IVC) gathered in Ulm, Germany, for the third GI/ITG KuVS Fachgespräch on Inter-Vehicular Communication. On both days, they ...
    • Sicherheit in Mobilen Ad hoc Netzwerken 

      Dissertation
      Kargl, Frank
      Mobile Ad hoc Netzwerke (MANETs) sind Netzwerke aus mobilen Knoten, die gänzlich ohne fest installierte Infrastruktur auskommen. Damit ermöglichen sie den Einsatz verteilter Anwendungen an Orten oder in Situationen, in ...