Suchergebnis: Lerneinheiten im Frühjahrssemester 2022
Informatik Master ![]() | ||||||
![]() | ||||||
![]() ![]() | ||||||
![]() ![]() ![]() | ||||||
Nummer | Titel | Typ | ECTS | Umfang | Dozierende | |
---|---|---|---|---|---|---|
252-0408-00L | Cryptographic Protocols ![]() | W | 6 KP | 2V + 2U + 1A | M. Hirt | |
263-2925-00L | Program Analysis for System Security and Reliability ![]() | W | 7 KP | 2V + 1U + 3A | M. Vechev | |
263-4600-00L | Formal Methods for Information Security ![]() | W | 5 KP | 2V + 1U + 1A | S. Krstic, R. Sasse, C. Sprenger | |
263-4656-00L | Digital Signatures ![]() | W | 5 KP | 2V + 2A | D. Hofheinz | |
263-4660-00L | Applied Cryptography ![]() ![]() Number of participants limited to 150. | W | 8 KP | 3V + 2U + 2P | K. Paterson |
Seite 1 von 1