User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
start [2017/10/23 19:32] – [TU/e Security Group] lallodistart [2018/04/03 01:21] – [Contacts] root
Line 14: Line 14:
 | Software security |White-box Cryptography |Wil Michiels | | Software security |White-box Cryptography |Wil Michiels |
 | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] |
-| Data analytics for security | Deep learning applied to cyber security,\\ [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | +| Data analytics for security | Deep learning applied to cyber security,  [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | 
-|Attacker and risk models| [[attackereconomics|Attacker economics]],\\ [[riskanalysis|Cyber-risk quantification]]| [[http://www.win.tue.nl/~lallodi/|Luca Allodi]]|+|Attacker and risk models| [[attackereconomics|Attacker economics]],  [[riskanalysis|Cyber-risk quantification]]| [[http://www.win.tue.nl/~lallodi/|Luca Allodi]]|
 | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] | | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] |
 | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] | | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] |
Line 37: Line 37:
  
 +31 040 2472853\\ +31 040 2472853\\
-<secsec@tue.nl> \\+secsec[at]tue[dot]nl> \\
 MetaForum building MetaForum building
 Room 6.061  Room 6.061 
start.txt · Last modified: 2022/01/13 16:11 by ggankhuyag