In Bearbeitung

Softwarebasierte Angriffe und Verteidigung

Supervision: Thorsten Holz
Author: Benjamin Kollenda

Kryptographische Protokolle

Supervision: Jörg Schwenk
Author: Sebastian Lauer

Security Analysis of Openchain

Supervision: Juraj Somorovsky
Author:

Entwicklung eines verschlüsselten Online-Office-Systems

Supervision: Dennis Felsch, Paul Rösler
Author:

QuillJS Integration in verschlüsseltes Online-Office-System

Supervision: Dennis Felsch, Paul Rösler
Author:

Sicherheit von real-world Protokollen

Supervision: Markus Dürmuth
Author: Martin Grothe

Analyse von IoT-Protokollen

Supervision: Thorsten Holz
Author: Jens Müller

Creating a Fuzzer Management Platform

Supervision: Robert Merget, Juraj Somorovsky
Author:

High Precision Timing Measurements with TLS-Attacker

Supervision: Robert Merget, Juraj Somorovsky
Author:
Page: