start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
start [2017/10/23 19:33] – [TU/e Security Group] lallodi | start [2020/11/19 17:39] – lallodi | ||
---|---|---|---|
Line 15: | Line 15: | ||
| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | ||
| Data analytics for security | Deep learning applied to cyber security, | | Data analytics for security | Deep learning applied to cyber security, | ||
- | |Attacker and risk models| [[attackereconomics|Attacker economics]], | + | |Attacker and risk models| [[attackereconomics|Attacker economics]], |
| Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// | | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// | ||
| Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http:// | | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http:// | ||
Line 37: | Line 37: | ||
+31 040 2472853\\ | +31 040 2472853\\ | ||
- | <secsec@tue.nl> \\ | + | secsec[at]tue[dot]nl> \\ |
MetaForum building | MetaForum building | ||
Room 6.061 | Room 6.061 |
start.txt · Last modified: 2022/01/13 16:11 by ggankhuyag