Skip to content
ZISC
  • About ZISC
    • Partners
    • How to Find Us
    • Annual Reports
    • Intranet
  • People
  • Research
    • Research Areas
    • Current Projects
    • Past Projects
    • Selected Publications
  • Education
    • Information Security Master Track
    • Continuing Education on Cyber Security
    • Security in School Education
  • Tech Transfer
    • ETH Studio NYC
    • Spin-off companies
  • OpenLab
  • Events & News
    • News
    • ZISC Seminars
    • OAuth Security Workshop 2017
    • ZISC Summit on Cyber Risks 2017 (EN)
    • ZISC Summit on Cyber Risks 2017 (DE)
    • ZISC Workshop 2016
    • ZISC Workshop 2015
    • ZISC Workshop 2014
  • Media
  • Open Positions
  • About ZISC
    • - Partners
    • - How to Find Us
    • - Annual Reports
    • - Intranet
  • People
  • Research
    • - Research Areas
    • - Current Projects
    • - Past Projects
    • - Selected Publications
  • Education
    • - Information Security Master Track
    • - Continuing Education on Cyber Security
    • - Security in School Education
  • Tech Transfer
    • - ETH Studio NYC
    • - Spin-off companies
  • OpenLab
  • Events & News
    • - News
    • - ZISC Seminars
    • - OAuth Security Workshop 2017
    • - ZISC Summit on Cyber Risks 2017 (EN)
    • - ZISC Summit on Cyber Risks 2017 (DE)
    • - ZISC Workshop 2016
    • - ZISC Workshop 2015
    • - ZISC Workshop 2014
  • Media
  • Open Positions

Past Projects

Past projects

Quantum players in constructive cryptography

Security of Avionics Communication System

Formal Methods for Federated Identity Management

Critical Infrastructure Security

New Routing Approaches for Bike Deliveries

Access Control for Next Generation systems

Cryptographic Constructions of Randomness Resources

Mining for Frauds

Analyzing and Maintaining Access Control Infrastructures

Data-usage Monitoring and Enforcement

Privacy in Modern Smartphones

Data Deletion

SecMetrics: On Quantifying Operational Security

Modularity in Trusted Party Emulation

Methods for the Design, Analysis, and Certification of Secure Boot Processes

Role Mining

Security Proofs in Number-theoretic Cryptography

Device Identification

Methods for Evaluating Anomaly Detection Systems

Efficiency in Secure Multi-Party Computations

Cryptographically Faithful Proofs of Security Protocols

Security of Cryptographic Functions and Efficient Implementations

Document Security

Methods for Automatic Analysis of Security Sensitive Protocols

Integrated Framework for Intrusion Management

Secure Storage

Isolation and Recovery for Secure SDN

Provably Secure Blockchains

Robotic stacking of parcels in containers and roll cages

Manipulation of non-rigid e-commerce parcels

Improving Network Security Through Programmability

Self-securing Networks

Towards Provably Secure Internet Communication

Topology-hiding computation

Research

  • Research Areas
  • Current Projects
  • Past Projects
  • Selected Publications

Recent News

  • ZISC Report 2022 is published
  • ZISC Chair Prof. Srdjan Capkun named IEEE fellow
  • Applied Crypto Group wins Distinguished Paper Award at ACM CCS
  • Digital emblem for International Red Cross
  • Distinguished Artifact Award at USENIX Security 2022
Theme by Think Up Themes Ltd. Powered by WordPress.