Teaching @ AAU Klagenfurt
Semester | Course |
---|---|
SS 2018 |
Lecture "Algorithms and Data Structures" Lecture "System Security" Lectures-Practical "Basics of Cryptology" Seminar on System Security |
WS 2017 |
Lecture "Algorithms and Complexity Theory" Lecture "Introduction to Theoretical Computer Science" Practical "Algorithms and Complexity Theory" Lectures-Practical "Applied Cryptology" Doctoral Seminar |
SS 2017 |
Lecture "Algorithms and Data Structures" Lecture "System Security" Practical "Algorithms and Data Structures" Lectures-Practical "Selected Topics of System Security" Seminar on System Security |
WS 2016 |
Lecture "Algorithms and Complexity Theory" Lecture "Introduction to Theoretical Computer Science" Practical "Algorithms and Complexity Theory" Lectures-Practical "Security Infrastructures" Practical "Praxis aus Technischer Mathematik" |
SS 2016 |
Lecture "Algorithms and Data Structures" Lecture "System Security" Practical in "Algorithms and Data Structures" Lectures-Practical "Basics of Cryptology" Seminar on System Security |
WS 2015 |
Lecture "Algorithms and Complexity Theory" Lecture "Introduction to Theoretical Computer Science" Lectures-Practical "Applied Cryptology" Practical "Algorithms and Complexity Theory" |
SS 2015 |
Lecture "Algorithms and Data Structures" Lecture "System Security" Seminar on System Security Lectures-Practical "Selected Topics of System Security" |
WS 2014 |
Lecture "Algorithms and Complexity Theory" Practical "Algorithms and Complexity Theory" Lectures-Practical "Security Infrastructures" |
SS 2014 |
Practical "Algorithms and Data Structures" Practical "System Security" Lectures-Practical "Logic and Reasoning for Transportation Safety and Security" |
WS 2013 |
Lecture "Algorithms and Complexity Theory" Practical "Algorithms and Complexity Theory" Lectures-Practical "Security Infrastructures" |
SS 2013 |
Practical "Algorithms and Data Structures" Practical "System Security" Seminar "Angewandte Informatik" |
WS 2012 |
Lecture "Algorithms and Complexity Theory" Practical "Algorithms and Complexity Theory" Lectures-Practical "Applied Cryptology" Lectures-Practical "Security Infrastructures" |
SS 2012 | Practical "System Security" |
WS 2011 |
Practical "Algorithms and Complexity Theory" Lectures-Practical "Basics of Cryptology" |
SS 2011 |
Practical "Algorithms and Data Structures" Practical "System Security" |
WS 2010 |
Practical "Introduction to Theoretical Computer Science" Practical "Algorithms and Complexity Theory" Lectures-Practical "Applied Cryptology" |
SS 2010 |
Practical "Algorithms and Data Structures" Practical "System Security" Lectures-Practical "Selected Topics of System Security" |
WS 2009 |
Lectures-Practical "System Security for Information Management" Practical "Algorithms and Complexity Theory" Practical "Introduction to Theoretical Computer Science" |
SS 2009 |
Practical "Algorithms and Data Structures" Practical "System Security" |
WS 2008 |
Practical "Introduction to Theoretical Computer Science" Lectures-Practical "System Security for Information Management" |
WS 2007 |
Kurs "Methods of Transportation Informatics and Logistics" Kurs "Foundations of Traffic Simulation and Control" |
SS 2007 |
Practical "Simulation Lab for Transportation and Logistics" Proseminar "Logic and Semantic Models in Transportation" |
WS 2006 |
Practical "Algorithms and Complexity Theory" Practical "Mathematical Methods of Transportation Informatics & Logistics" |
SS 2006 | Practical "System Security" |
SS 2005 | Tutorium "Tutorium zu Mathematik für Informatiker II" |
WS 2004 | Practical "Repetitorium zu Lineare Algebra und Geometrie II" |
WS 2003 | Tutorium "Analysis I" |
WS 2002 | Tutorium "Analysis I" |
Type | Title | Author |
---|---|---|
Master | Simulation von Security in kritischen Infrastrukturen | Thomas Grafenauer |
Master | Social Risk Response | Tobias Banzhaf |
Master | Implementation and security analysis of secret sharing protocols | Veronika Pachatz |
Master | Passwort-Management in Webbrowsers | Armin Preiml |
Master | Optimierung von IT Governance im Konzern IT-Risikomanagement der Cloud mit COBIT und ITIL | Patrick Sudy |
Master | Automatisiertes Client Management basierend auf dem IT Service Management Referenzprozess laut ITIL | Reinhard Gregoritsch |
Master | Intrusion Detection Techniken und Grundlagen des Datenschutzes für IT Dienstleister | Fritz Beichbuchner |
Master | Erweiterung des FFapl-Compilers um Pairings auf elliptischen Kurven | Johannes Winkler |
Master | Whisper - Secure Messaging | Philipp Moll |
Master | Blinde Turingmaschinen | Monika Brodbeck |
Master | Eine Umgebung zum vereinfachten Prototyping von Krypto-Verfahren | Alexander O. Ortner |
Master | Bibliothek zur Implementierung kryptographischer Protokolle in endlichen Körpern | Johannes Theuermann |
Master | Ausgewählte Aspekte von Public-Key Infrastrukturen | Kerstin Wiedenbauer |
Master | Microscopic Traffic Simulation with Intelligent Agents | Sarah Blatnig |
Diploma thesis | Verkehrsstatistiken Konzeption und Realisierung einer Zusatzapplikation für elektronische Mautsysteme zur Generierung von Verkehrsstatistiken | Christiane Dollinger |
Diss | Entwicklung einer Metrik zur automatisierten Analyse und Bewertung von Bedrohungsszenarien mit Hilfe neuronaler Netzwerke | Alexander Beck |
Diss | Stochastic Analysis of Security and Capacity of a Quantum Network | Sandra König |