Seite nicht gefunden / Page not found
Die angeforderte Seite wurde nicht gefunden. Es wird eine Suchanfrage für Sie gestartet.
The requested page could not be found. A search will be started for you.
Sie suchen nur auf www.kastel.kit.edu. ➔KIT-weit suchen
Treffer: 1-10 von 66
Security and Privacy Awareness
Security and Privacy Awareness type: Seminar (S) semester: WS 20/21 lecturer: Thilo GottschalkMattia Mossano
Lukas Aldag
Prof. Dr. Franziska Boehm
Reyhan Düzgün
Dr.-Ing. Peter Mayer
Prof. Dr. Melanie Volkamer sws: 2 lv-no.: 2400125 information: Online links weitere Informationen ILIAS-Course Inhalt Im Rahmen dieses interdisziplinären Seminars
https://www.kastel.kit.edu/english/veranstaltungen_1337.php
23.06.2021
KASTEL → Teaching → Certificate for Students → Events (German)
Access Control Systems: Foundations and Practice
Access Control Systems: Foundations and Practice type: Vorlesung / Übung (VÜ) chair: KIT-Fakultäten - KIT-Fakultät für Informatik - Institut für Telematik - ITM Hartenstein semester: SS 2021 time: 13.04.202110:00 - 11:30 wöchentlich
weitere... 16.04.2021
12:00 - 13:30 wöchentlich
20.04.2021
10:00 - 11:30 wöchentlich
23.04.2021
12:00 -
https://www.kastel.kit.edu/english/veranstaltungen_1010.php
23.06.2021
KASTEL → Teaching → Certificate for Students → Events (German)
Access Control Systems: Foundations and Practice
Access Control Systems: Foundations and Practice Typ: Vorlesung / Übung (VÜ) Lehrstuhl: KIT-Fakultäten - KIT-Fakultät für Informatik - KASTEL – Institut für Informationssicherheit und Verlässlichkeit - KASTEL Hartenstein Semester: SS 2022 Zeit: Di 19.04.202209:45 - 11:15, wöchentlich
50.34 Raum -102
50.34 INFORMATIK,
https://www.kastel.kit.edu/veranstaltungen_1010.php
04.04.2022
KASTEL → Lehre → Zertifikat für Studierende → Veranstaltungen
Human Factors in Security and Privacy
.pdf Andrew Odlyzko: Economics, Psychology and Sociology of Security: http://www.dtc.umn.edu/~odlyzko/doc/econ.psych.security.pdfLehrinhalt
Diese Vorlesung und die dazugehörige Übung behandeln
https://www.kastel.kit.edu/english/veranstaltungen_1276.php
23.06.2021
KASTEL → Teaching → Certificate for Students → Events (German)
Human Factors in Security and Privacy
.pdf Andrew Odlyzko: Economics, Psychology and Sociology of Security: http://www.dtc.umn.edu/~odlyzko/doc/econ.psych.security.pdfLehrinhalt
Diese Vorlesung und die dazugehörige Übung behandeln
https://www.kastel.kit.edu/veranstaltungen_1276.php
22.06.2021
KASTEL → Lehre → Zertifikat für Studierende → Veranstaltungen
Cloud Computing
not yet been addressed within the legal discussions.The question arises how the liability and evidence situation of the cloud user can be adequately strengthened. Furthermore, evaluation of different cloud computing systems with regard to data protection law is need to
https://www.kastel.kit.edu/english/62.php
23.06.2021
KASTEL →
We Are Hiring!
send us your application (including motivation letter, CV, university diplomas, awards, and other related and important documents) as a single PDF document to jobs at kastel kit edu . We are looking forward to your application!KIT Graduate School Cyber Security
https://www.kastel.kit.edu/jobs.php
04.04.2023
KASTEL → Jobs
Publikationsliste
Systems (ITSC), Bilbao, 24th-28th September 2023, 1896 – 1903, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10421975Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.;
https://www.kastel.kit.edu/publikationen.php
22.06.2021
KASTEL → Publikationen
List of Publications
Systems (ITSC), Bilbao, 24th-28th September 2023, 1896 – 1903, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10421975Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.;
https://www.kastel.kit.edu/english/publikationen.php
23.06.2021
KASTEL → Scientific Publications
Developing Secure Component-Based Software
our approach indicate,which parameters and return values of software interfaces may be known by which user roles,
how hardware and runtime environment influence the confidentiality of processed data,
https://www.kastel.kit.edu/english/187.php
23.06.2021
KASTEL →