TUM's Secure mobile systems



  • Description:

    • Security architectures and protocols for secure wireless and mobile communication technologies (GSM, UMTS, WLAN, Bluetooth)

    • Smart Cards and other security tokens Current uses cases like: security problems of the Myfair Chip, security mechanisms of the German electronic identity card (ePA), and the German electronic health card (eGK)

    • Secure wireless sensor networks: Problems and solutions RFID technology: applications scenarios, security requirements and solutions (e.g. EPCglogal supply chain)

  • Hours: 40

  • Level: intermediate

  • Public/private: public

  • Price: free

  • How to attend: register at TUM registration course system