The Systems Security research group has more than 25 years of IT security experience, including applied cryptography, security infrastructures, IT risk management, security policy evaluation, and protocol and prototype design. We participate in national and international research projects and conferences and act as external reviewers, consultants, and lecturers. The group is closely linked to international institutions and researchers concerned with threats, critical infrastructure protection and the application of statistics, decision-making and game theory of security. We offer basic lectures for the undergraduate students (Algorithms and Data Structures, Introduction to Theoretical Computer Science, System Security, and Complexity Theory) and Special Courses for Master and Ph.D. Students (Foundations of Cryptology, Applied Cryptography, Security Infrastructures, Selected Topics in Systems Security and the Seminar on System Security). Also, the members of the System Safety research group supervise various bachelor, master, and doctoral theses, either in the context of study applications or as part of ongoing research projects.
Applied Cryptography
Security Infrastructures
IT-Risk Management
Game- and Decision-Theory
Robot Security
Design and Evaluation of Security Concepts
Security Information and Event Management (SIEM)
Quantum Cryptograpy and Applications
Scientific project support should be used in every (costly) project from the beginning, so that system errors and bad investments can be avoided at an early stage.
Analysis and evaluation of crypto-mechanisms and cryptographic hardware and software. Experience shows that many of the security products available on the market (software and hardware) are insecure.
Organization and conduction of information and training events. Further information can is available from the menu "Teaching" and "Events". You can also contact us by email at any time. We are looking forward to your message or visit.
In many IT security products, patents infringement may be an issue. Patent attorneys may lack the technical expertise in some cases. As consultants, we offer expertise to aid patent claims and to identify various forms of patent infringement. An examination of this kind can also save costs later on.
Expert advice in case of conflict is indicated whenever expectations are foreseeable to be not satisfied. Legal disputes can become costly and critical to a company's business. In concrete cases, the question of guilt is far from evident and hard to clarify. Our goal here is to help to settle arguments to prevent damage or losses for either party.
Design of application-oriented (individually tailored) cryptographic mechanisms and protocols, especially in the research areas of the group (see above). Especially in mass applications, we offer our expertise to contribute to safety and security (for example, token-based sports events using transponders in running shoes, tickets at events, and many others can benefit from our experience.