|
Nummer
|
Name
|
Dozent
|
1
|
150232
|
Number Theory
|
Kus, Deniz
|
2
|
141249
|
Web-and Browser-Security
|
Heiderich, Mario
|
3
|
128968
|
Web-Engineering
|
König, Markus
|
4
|
141033
|
Usable Security and Privacy
|
Dürmuth, Markus
|
5
|
140000
|
Tutorial
|
Tutoren
|
6
|
150240
|
Theoretical Computer Science
|
Buchin, Maike
|
7
|
500004
|
Theoretische Informatik
|
Kiltz, Eike
|
8
|
141218
|
System Theory 2: Signal Transformations
|
Sezgin, Aydin
|
9
|
141170
|
Systemtheorie 1 - Signale und Systeme
|
Martin, Rainer
|
10
|
141340
|
System Security
|
Holz, Thorsten
|
11
|
150351
|
Symmetric Cryptanalysis
|
Leander, Gregor
|
12
|
141030
|
Software Implementation of Cryptographic Schemes
|
Hoffmann, Max
|
13
|
141346
|
Software Engineering
|
Studiendekan ITS
|
14
|
150560
|
Seminar zur Real World Cryptoanalysis
|
May, Alexander
|
15
|
150537
|
Seminar zur Kryptographie
|
Leander, Gregor
|
16
|
150542
|
Seminar on Knowledge Graphs
|
Acosta Deibe, Maribel
|
17
|
141140
|
Computer Architecture
|
Niemann, Philipp
|
18
|
141026
|
Computer Architecture
|
Niemann, Philipp
|
19
|
150318
|
Quantum Algorithms
|
May, Alexander
|
20
|
150277
|
Public Key Encoding
|
Fleischhacker, Nils
|
21
|
141343
|
Programmierung für ITS (PO 20)
|
Glasmachers, Tobias
|
22
|
149872
|
Programming C
|
Dürmuth, Markus
|
23
|
141241
|
Program Analysis
|
Holz, Thorsten
|
24
|
141090
|
Project Days
|
Mayr, Pierre
|
25
|
150306
|
Post quantum cryptography
|
Kiltz, Eike
|
26
|
141028
|
Physical Attacks and Countermeasures
|
Moradi, Amir
|
27
|
141105
|
Nichttechnische Veranstaltungen
|
Dozenten der RUB
|
28
|
141243
|
Network Security 2
|
Schwenk, Jörg
|
29
|
141242
|
Network Security 1
|
Schwenk, Jörg
|
30
|
310509
|
Concurrent Programming
|
Arinir, Doga
|
31
|
150324
|
Model Checking
|
Zeume, Thomas
|
32
|
141032
|
Methods of User Authentication
|
Dürmuth, Markus
|
33
|
141252
|
Message-Level Security
|
Mainka, Christian
|
34
|
141027
|
Managing Human Behaviour in IT Security
|
Sasse, Martina Angela
|
35
|
150136
|
Mathematik 2 für Informatik und ITS (PO 20)
|
Stump, Christian
|
36
|
150112
|
Mathematics 2
|
Püttmann, Annett
|
37
|
150128
|
Mathematik 1 für Informatik und ITS (PO 20)
|
Leander, Gregor
|
38
|
150110
|
Mathematics 1
|
Lipinski, Mario
|
39
|
144102
|
Master Thesis ITS
|
Hochschullehrer der Fakultät ET/IT
|
40
|
140002
|
Master Startup ITS
|
Güneysu, Tim
|
41
|
143291
|
Master-Seminar Usable Security and Privacy Research
|
Dürmuth, Markus
|
42
|
143163
|
Master Seminar Speech and Pattern Recognition
|
Kolossa, Dorothea
|
43
|
141034
|
Master-Seminar Security Engineering
|
Moradi, Amir
|
44
|
141211
|
Master Seminar Physical Layer Security Journal Club
|
Sezgin, Aydin
|
45
|
143240
|
Master Seminar Network and Data Security
|
Schwenk, Jörg
|
46
|
143248
|
Master-Seminar Human Centered Security and Privacy
|
Sasse, Martina Angela
|
47
|
143250
|
Master seminar Applied Privacy and Anonymity
|
Degeling, Martin
|
48
|
143242
|
Master Seminar Current topics in IT Security
|
Holz, Thorsten
|
49
|
142241
|
Master Project on Network and Data Security
|
Schwenk, Jörg
|
50
|
142024
|
Master Project Embedded Security
|
Paar, Christof
|