Center for Advanced Security Research Darmstadt

Results: 34



#Item
1The Department of Computer Science of the Technische Universität Darmstadt invites applications for positions of Research Assistants in Cryptography and Complexity Theory both on doctoral and postdoctoral level, in the

The Department of Computer Science of the Technische Universität Darmstadt invites applications for positions of Research Assistants in Cryptography and Complexity Theory both on doctoral and postdoctoral level, in the

Add to Reading List

Source URL: www.cryptoplexity.informatik.tu-darmstadt.de

Language: English - Date: 2016-08-19 22:14:13
2AFAUC – anti-forensics of storage devices by alternative use of communication channels Harald Baier, Julian Knauer Hochschule Darmstadt, CASED

AFAUC – anti-forensics of storage devices by alternative use of communication channels Harald Baier, Julian Knauer Hochschule Darmstadt, CASED

Add to Reading List

Source URL: www.imf-conference.org

Language: English - Date: 2014-05-21 12:58:53
310 Years Telecooperation at TU Darmstadt 25 Years Telecooperation Research

10 Years Telecooperation at TU Darmstadt 25 Years Telecooperation Research

Add to Reading List

Source URL: www.tk.informatik.tu-darmstadt.de

Language: English - Date: 2011-11-29 07:20:34
422nd USENIX Security Symposium August 14–16, 2013 Washington, D.C. Message from the Program Chair. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

22nd USENIX Security Symposium August 14–16, 2013 Washington, D.C. Message from the Program Chair. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-02-27 22:49:53
5TDL Darmstadt Working Group Meeting 4-6th May 2015 Hosted by CASED / TU Darmstadt Mornewegstraße 30/32, 64293 Darmstadt  Event Programme

TDL Darmstadt Working Group Meeting 4-6th May 2015 Hosted by CASED / TU Darmstadt Mornewegstraße 30/32, 64293 Darmstadt Event Programme

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-05-01 08:44:56
6Entwicklung sicherer Software durch Security by Design

Entwicklung sicherer Software durch Security by Design

Add to Reading List

Source URL: www.cased.de

Language: English - Date: 2015-04-22 04:39:27
7CLEARER: Security and Privacy Research Roadmap for the CrySyS Lab Levente Buttyán, Márk Félegyházi, Boldizsár Bencsáth Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and E

CLEARER: Security and Privacy Research Roadmap for the CrySyS Lab Levente Buttyán, Márk Félegyházi, Boldizsár Bencsáth Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and E

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:23:56
8Bit	
  Stream	
  Analysis	
  of	
  Physical	
  Unclonable	
  Functions	
  based	
   on	
  Resistance	
  Variations	
  in	
  Metals	
  and	
  Transistors	
   Jing	
  Ju,	
  Raj	
  Chakraborty,	
  Reza

Bit  Stream  Analysis  of  Physical  Unclonable  Functions  based   on  Resistance  Variations  in  Metals  and  Transistors   Jing  Ju,  Raj  Chakraborty,  Reza

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2012-05-24 13:08:02
9

PDF Document

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 07:03:14
10

PDF Document

Add to Reading List

Source URL: egovernmentcluster.org.au

Language: English - Date: 2015-05-07 19:36:58