Past projects
Quantum players in constructive cryptography
Security of Avionics Communication System
Formal Methods for Federated Identity Management
Critical Infrastructure Security
New Routing Approaches for Bike Deliveries
Access Control for Next Generation systems
Cryptographic Constructions of Randomness Resources
Analyzing and Maintaining Access Control Infrastructures
Data-usage Monitoring and Enforcement
SecMetrics: On Quantifying Operational Security
Modularity in Trusted Party Emulation
Methods for the Design, Analysis, and Certification of Secure Boot Processes
Security Proofs in Number-theoretic Cryptography
Methods for Evaluating Anomaly Detection Systems
Efficiency in Secure Multi-Party Computations
Cryptographically Faithful Proofs of Security Protocols
Security of Cryptographic Functions and Efficient Implementations
Methods for Automatic Analysis of Security Sensitive Protocols
Integrated Framework for Intrusion Management
Isolation and Recovery for Secure SDN
Robotic stacking of parcels in containers and roll cages
Manipulation of non-rigid e-commerce parcels
Improving Network Security Through Programmability