Carolin Latze

Learn More
EAP-TLS is one of the best authentication schemes in wireless networks. To make it one of the most secure ones, a client has to authenticate itself using certificates, which allow to authenticate client and server mutually. But as certificates are widespread in a business environment but only less used by private users, mutual authentication in EAP-TLS for(More)
Compared to many 802.11 based networks, GSM has an significant advantage. In contrast to 802.11, GSM provides a standardized authentication scheme, which requires no configuration on the end userpsilas side, but still allows international roaming. GSM does this by using a trusted module within each client: a subscriber identification module.In contrast to(More)
The research group “Computer Networks and Distributed System” of the Institute of Computer Science and Applied Mathematics at the University of Bern, headed by Prof. Torsten Braun, organized an internal retreat from July 2-4, 2007 at Quarten. The reserach group “Telecommunications, Networks, Security” of the Department of Computer Science at the University(More)
E-Commerce applications such as online shopping or e-banking are steadily gaining popularity in every-day life. Yet, many users are not aware of how to avoid the associated security problems: they don’t choose secure passwords, check server certificates, or reliably react to browser warnings when a certificate can’t be verified. Thus, protecting users from(More)
Communication over multiple hops, such as in hybrid wireless networks, can only work if the individual hops cooperate by forwarding packets from other hops. We present the Linux implementation of our previously proposed cooperation and accounting strategy for hybrid wireless networks called CASHnet. We describe our implementation as well as our testbed,(More)
The goal of this thesis was to develop a secure and user friendly authentication scheme for public wireless networks (PWLANs). In contrast to private wireless networks, public wireless networks need a proper authentication scheme for several reasons. First of all, the network operator must be able to identify a user in case an incident happens. Furthermore,(More)
The secure usage of network nodes in smaller networks like company networks relies on the usage of uncompromised applications. There are many modern approaches to ensure the security in particular the integrity of applications, but these solutions assume a secure operating system as base. As this assumption is very critical, there emerged other solutions to(More)
The emergence of mobile phones with integrated 802.11 chipsets lead to the idea of replacing GSM calls with VOIP calls. Mutual authentication using EAP-TLS based protocols allows to automatically authenticate embedded devices at public wireless hotspots, which is one of the prerequisites in order to have a comfortable GSM-like 802.11 based setup. This work(More)
Nowadays authentication at public wireless hotspots is still not very comfortable for normal users. Most of the hotspots provide a captive portal asking the user for credentials or his phone number to send him an one-time password (OTP). This is uncomfortable especially on embedded devices like mobile phones due to the small screen. Therefore the PWLAN(More)
  • 1