start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
start [2017/10/23 19:32] – [TU/e Security Group] lallodi | start [2017/10/23 19:33] – [TU/e Security Group] lallodi | ||
---|---|---|---|
Line 14: | Line 14: | ||
| Software security |White-box Cryptography |Wil Michiels | | | Software security |White-box Cryptography |Wil Michiels | | ||
| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | ||
- | | Data analytics for security | Deep learning applied to cyber security,\\ [[processmining|Process mining applied to security and privacy]] |[[http:// | + | | Data analytics for security | Deep learning applied to cyber security, |
- | |Attacker and risk models| [[attackereconomics|Attacker economics]], | + | |Attacker and risk models| [[attackereconomics|Attacker economics]], |
| Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// | | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// | ||
| Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http:// | | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http:// |
start.txt · Last modified: 2022/01/13 16:11 by ggankhuyag