Options
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
Sovereignly Donating Medical Data as a Patient: A Technical Approach
Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain
FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor
GAIA-X and IDS
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Decentralized Identities for Self-sovereign End-users (DISSENS)
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
Activation Anomaly Analysis
Privatsphäre und Maschinelles Lernen
A Comparative Security Analysis of the German Federal Postal Voting Process