Skip to content
ZISC
  • About ZISC
    • Partners
    • How to Find Us
    • Annual Reports
    • Intranet
  • People
  • Research
    • Research Areas
    • Current Projects
    • Past Projects
    • Selected Publications
  • Education
    • Information Security Master Track
    • Continuing Education on Cyber Security
    • Security in School Education
  • Tech Transfer
    • ETH Studio NYC
    • Spin-off companies
  • OpenLab
  • Events & News
    • News
    • ZISC Seminars
    • OAuth Security Workshop 2017
    • ZISC Summit on Cyber Risks 2017 (EN)
    • ZISC Summit on Cyber Risks 2017 (DE)
    • ZISC Workshop 2016
    • ZISC Workshop 2015
    • ZISC Workshop 2014
  • Media
  • Open Positions
  • About ZISC
    • - Partners
    • - How to Find Us
    • - Annual Reports
    • - Intranet
  • People
  • Research
    • - Research Areas
    • - Current Projects
    • - Past Projects
    • - Selected Publications
  • Education
    • - Information Security Master Track
    • - Continuing Education on Cyber Security
    • - Security in School Education
  • Tech Transfer
    • - ETH Studio NYC
    • - Spin-off companies
  • OpenLab
  • Events & News
    • - News
    • - ZISC Seminars
    • - OAuth Security Workshop 2017
    • - ZISC Summit on Cyber Risks 2017 (EN)
    • - ZISC Summit on Cyber Risks 2017 (DE)
    • - ZISC Workshop 2016
    • - ZISC Workshop 2015
    • - ZISC Workshop 2014
  • Media
  • Open Positions

Past Projects

Past projects

Quantum players in constructive cryptography

Security of Avionics Communication System

Formal Methods for Federated Identity Management

Critical Infrastructure Security

New Routing Approaches for Bike Deliveries

Access Control for Next Generation systems

Cryptographic Constructions of Randomness Resources

Mining for Frauds

Analyzing and Maintaining Access Control Infrastructures

Data-usage Monitoring and Enforcement

Privacy in Modern Smartphones

Data Deletion

SecMetrics: On Quantifying Operational Security

Modularity in Trusted Party Emulation

Methods for the Design, Analysis, and Certification of Secure Boot Processes

Role Mining

Security Proofs in Number-theoretic Cryptography

Device Identification

Methods for Evaluating Anomaly Detection Systems

Efficiency in Secure Multi-Party Computations

Cryptographically Faithful Proofs of Security Protocols

Security of Cryptographic Functions and Efficient Implementations

Document Security

Methods for Automatic Analysis of Security Sensitive Protocols

Integrated Framework for Intrusion Management

Secure Storage

Isolation and Recovery for Secure SDN

Provably Secure Blockchains

Research

  • Research Areas
  • Current Projects
  • Past Projects
  • Selected Publications

Recent News

  • Design for Digital Cash nominated for ETH Spark Award
  • Solving deceptive cookie banners with machine learning
  • SCION enters everyday service
  • ZISC faculty member Prof. Perrig named IEEE Fellow
  • The annual ZISC Report for 2021 is published
Theme by Think Up Themes Ltd. Powered by WordPress.