Studiengänge
Abschluss |
Studiengang |
Semester |
Leistungspunkte |
Bachelor |
Medieninformatik (B.Sc.), PV 29
|
-
|
15
|
Master |
Computer Science and Media (M.Sc.), PV 11
|
-
|
15
|
Bachelor |
Medieninformatik (B.Sc.), PV 11
|
-
|
15
|
Master |
Human-Computer Interaction (M.Sc.), PV14
|
-
|
15
|
Bachelor |
Medieninformatik (B.Sc.), PV 17
|
-
|
15
|
Bachelor |
Medieninformatik (B.Sc.), PV 16
|
-
|
15
|
Master |
Human-Computer Interaction (M.Sc.), PV17
|
-
|
15
|
Master |
Digital Engineering (M.Sc.), PV 17
|
-
|
15
|
Master |
Human-Computer Interaction (M.Sc.), PV15
|
-
|
15
|
Master |
Computer Science for Digital Media (M.Sc.), PV 18
|
-
|
15
|
Master |
Digital Engineering (M.Sc.), PV 19
|
-
|
15
|
Abschlusszeugnis/Zertifik |
Angewandte Betriebswirtschaftslehre (Zertifikat), PV 17
|
-
|
15
|
Master |
Human-Computer Interaction (M.Sc.), PV19
|
-
|
12
|
Master |
Computer Science for Digital Media (M.Sc.), PV 17
|
-
|
15
|
Inhalt
engl. Beschreibung/ Kurzkommentar |
The Internet of Things (IoT) developed itself from an upcoming trend to a present instance in our every-day lives. While more and more people enjoy talking to Alexa or Siri or automating their homes, many people are still skeptical, especially when it comes to terms related to privacy and security. In this project, we want to implement different variations of a protocol that allows us to integrate only trusted devices to our network. Afterward, we want to evaluate the protocols and the implementations to relate a conclusion towards securing out IoT networks. |
Bemerkung |
Zeit und Ort werden zur Projektbörse bekannt gegeben / Time and place wil be announced on the project fair |
Voraussetzungen |
Bachelor: Kryptographie und Mediensicherheit, Webtechnologie; Master: mindestens eine Krypto-Veranstaltung (z.B. Introduction to modern Cryptography) |
Leistungsnachweis |
Midterm presentation; Final presentation; Documentation (scientific paper) |
Zielgruppe |
Medieninformatik B.Sc.; CS4DM M.Sc.; CSM M.Sc.; HCI M.Sc.; Digital Engineering M.Sc. |