128:
24:
330:
319:, was the ultimate goal of the Center. Subsequently, they hoped to prevent substantial economic damage caused by economic espionage, manipulation, and product counterfeiting. Another aim was to make new techniques and online services run smoothly and safely for both providers and users.
304:
CASED was part of LOEWE. LOEWE is an initiative of the government of Hesse (Ministry of Higher
Education, Research and the Arts) for supporting the development of scientific and economic excellence in Hesse on a long-term basis. The government of
676:
482:, Stanislav Bulygin, Christoph Busch, Peter Buxmann, Marc Fischlin, Iryna Gurevych, Matthias Hollick, Sorin A. Huss, Stefan Katzenbeisser, Andreas Koch, Heiko Mantel, Mark Manulis, Mira Mezini, Max Mühlhäuser,
41:
596:
647:
726:
810:
312:
In those funded projects, computer scientists, engineers, physicians, legal experts and economists of the three cluster partners did basic and application-oriented research.
486:, Ahmad-Reza Sadeghi, Werner Schindler, Andy SchĂĽrr, Martin Steinebach, Thorsten Strufe, Neeraj Suri, Melanie Volkamer, Michael Waidner, Thomas Walther, Leonardo Martucci
640:
346:: Basic research and development of procedures for digital data security in a heterogeneous, dynamic and decentralized world with computers being present everywhere.
681:
504:
364:: Basic research and development of procedures for security and reliability of new human-computer interaction as well as software- and communication concepts.
88:
800:
633:
568:
60:
323:
352:: Basic research and development of procedures for protection of embedded systems, which often only have small resources and few means of communication.
67:
298:
289:) was a center for IT security research and development with an interdisciplinary and cross-organizational approach. It was founded in July 2008 by
269:
805:
74:
294:
756:
127:
56:
751:
706:
656:
107:
315:
Research and development of new security solutions for important growing areas of IT technology, such as embedded systems and
453:
Compliance recognition of
Malware Security testing, Security metrics, Security in Service-orientated Architectures and Clouds
81:
45:
316:
358:: Basic research and development of procedures for durable improvement of security and reliability of on-demand services.
761:
535:
512:
309:
provided funding for the infrastructure of CASED as well as for various projects of the three institutions involved.
779:
701:
34:
483:
588:
263:
666:
173:
563:
201:
196:
746:
479:
322:
CASED merged with the
European Center for Security and Privacy by Design (EC SPRIDE) into the
186:
716:
181:
381:
Cryptography including
Quantum Cryptography, Public-Key- and other Secure Infrastructures
794:
625:
290:
258:
475:
390:
Digital
Watermarking, Digital Rights Management and Enterprise Rights Management
23:
208:
611:
598:
301:. CASED promoted and coordinated cooperation between the three institutions.
239:
691:
243:
218:
736:
151:
328:
306:
578:
465:
Biometry, Recognition of
Persons and Tracking Security Awareness
329:
677:
Department of
Electrical Engineering and Information Technology
629:
573:
17:
540:
509:
462:
295:
the Fraunhofer Institute for Secure Information Technology
536:"CASED - Center for Advanced Security Research Darmstadt"
564:
Homepage Center for Advanced Security Research Darmstadt
121:
Center for Advanced Security Research Darmstadt (CASED)
583:
727:
Graduate School of Economics, Finance, and Management
505:"CRISP - Center for Research in Security and Privacy"
456:
Secure Webapplications, Usability of Secure products
770:
735:
715:
690:
665:
371:
offers a structured program for CASED PhD students.
333:
The Center for Advanced Security Research Darmstadt
249:
235:
227:
217:
207:
195:
172:
160:
150:
142:
134:
48:. Unsourced material may be challenged and removed.
57:"Center for Advanced Security Research Darmstadt"
283:Center for Advanced Security Research Darmstadt
641:
8:
120:
474:Gernot Alber, Reiner Anderl, Harald Baier,
324:Center for Research in Security and Privacy
811:Information technology research institutes
648:
634:
626:
119:
574:Homepage Technische Universität Darmstadt
444:E-Voting, eHealth, eCommerce, eGovernment
108:Learn how and when to remove this message
411:Security in Wireless and Sensor-networks
299:Darmstadt University of Applied Sciences
270:Darmstadt University of Applied Sciences
495:
435:Secure Operating systems and Middleware
414:Secure Applications for Mobile devices
7:
46:adding citations to reliable sources
707:Ubiquitous Knowledge Processing Lab
426:Side Channel Analysis and Hardening
14:
420:Protection against Product piracy
801:Technische Universität Darmstadt
658:Technische Universität Darmstadt
459:Legally and economically Aspects
126:
22:
589:Homepage der Universität Kassel
405:Security of RFIDs and Chipcards
33:needs additional citations for
806:Research institutes in Germany
682:Department of Computer Science
441:Models of Trust and Reputation
167:basic and application-oriented
1:
584:Homepage Hochschule Darmstadt
534:Cybersecurity, Profile Area.
503:Cybersecurity, Profile Area.
408:Self-healing and Self-defence
317:service-oriented architecture
402:Security of Embedded systems
827:
438:Identity/Access-Management
393:Data Privacy and Copyright
125:
579:Homepage Fraunhofer SIT
478:, Alejandro Buchmann,
417:Recognition of Malware
334:
162:Field of research
747:August-Euler-Airfield
332:
612:49.87250°N 8.63528°E
569:LOEWE-Förderprogramm
362:Smart Civil Security
42:improve this article
608: /
484:Alexander Rossnagel
470:Involved scientists
447:Multimedia Security
387:Long-time Archiving
384:Formal Verification
122:
762:Residential Palace
335:
143:Research type
788:
787:
780:Merck Lectureship
617:49.87250; 8.63528
480:Johannes Buchmann
432:Software Security
429:Security-Policies
423:Trusted Computing
399:Trusted Computing
279:
278:
187:Johannes Buchmann
146:Interdisciplinary
118:
117:
110:
92:
818:
773:
752:Botanical Garden
739:
719:
718:Graduate schools
694:
669:
659:
650:
643:
636:
627:
623:
622:
620:
619:
618:
613:
609:
606:
605:
604:
601:
551:
550:
548:
546:
531:
525:
524:
522:
520:
511:. Archived from
500:
251:Operating agency
168:
130:
123:
113:
106:
102:
99:
93:
91:
50:
26:
18:
826:
825:
821:
820:
819:
817:
816:
815:
791:
790:
789:
784:
771:
766:
737:
731:
717:
711:
692:
686:
667:
661:
657:
654:
616:
614:
610:
607:
602:
599:
597:
595:
594:
560:
555:
554:
544:
542:
533:
532:
528:
518:
516:
515:on 21 June 2019
502:
501:
497:
492:
472:
450:Risk Management
378:
376:Research topics
369:graduate school
356:Secure Services
340:
275:
272:
252:
231:Mornewegstr. 32
191:
182:Michael Waidner
166:
163:
114:
103:
97:
94:
51:
49:
39:
27:
12:
11:
5:
824:
822:
814:
813:
808:
803:
793:
792:
786:
785:
783:
782:
776:
774:
768:
767:
765:
764:
759:
754:
749:
743:
741:
733:
732:
730:
729:
723:
721:
713:
712:
710:
709:
704:
698:
696:
688:
687:
685:
684:
679:
673:
671:
663:
662:
655:
653:
652:
645:
638:
630:
592:
591:
586:
581:
576:
571:
566:
559:
558:External links
556:
553:
552:
526:
494:
493:
491:
488:
471:
468:
467:
466:
463:
460:
457:
454:
451:
448:
445:
442:
439:
436:
433:
430:
427:
424:
421:
418:
415:
412:
409:
406:
403:
400:
397:
394:
391:
388:
385:
382:
377:
374:
373:
372:
365:
359:
353:
347:
339:
338:Research areas
336:
297:(SIT) and the
277:
276:
274:
273:
268:
266:
264:Fraunhofer SIT
261:
255:
253:
250:
247:
246:
237:
233:
232:
229:
225:
224:
221:
215:
214:
211:
205:
204:
199:
193:
192:
190:
189:
184:
178:
176:
170:
169:
164:
161:
158:
157:
154:
148:
147:
144:
140:
139:
136:
132:
131:
116:
115:
30:
28:
21:
13:
10:
9:
6:
4:
3:
2:
823:
812:
809:
807:
804:
802:
799:
798:
796:
781:
778:
777:
775:
769:
763:
760:
758:
755:
753:
750:
748:
745:
744:
742:
740:
734:
728:
725:
724:
722:
720:
714:
708:
705:
703:
700:
699:
697:
695:
689:
683:
680:
678:
675:
674:
672:
670:
664:
660:
651:
646:
644:
639:
637:
632:
631:
628:
624:
621:
590:
587:
585:
582:
580:
577:
575:
572:
570:
567:
565:
562:
561:
557:
541:
537:
530:
527:
514:
510:
506:
499:
496:
489:
487:
485:
481:
477:
469:
464:
461:
458:
455:
452:
449:
446:
443:
440:
437:
434:
431:
428:
425:
422:
419:
416:
413:
410:
407:
404:
401:
398:
395:
392:
389:
386:
383:
380:
379:
375:
370:
366:
363:
360:
357:
354:
351:
350:Secure Things
348:
345:
342:
341:
337:
331:
327:
325:
320:
318:
313:
310:
308:
302:
300:
296:
292:
288:
284:
271:
267:
265:
262:
260:
257:
256:
254:
248:
245:
241:
238:
234:
230:
226:
222:
220:
216:
212:
210:
206:
203:
200:
198:
194:
188:
185:
183:
180:
179:
177:
175:
171:
165:
159:
156:LOEWE funding
155:
153:
149:
145:
141:
137:
133:
129:
124:
112:
109:
101:
90:
87:
83:
80:
76:
73:
69:
66:
62:
59: –
58:
54:
53:Find sources:
47:
43:
37:
36:
31:This article
29:
25:
20:
19:
16:
593:
543:. Retrieved
539:
529:
517:. Retrieved
513:the original
508:
498:
473:
396:IT Forensics
368:
361:
355:
349:
343:
321:
314:
311:
303:
291:TU Darmstadt
286:
282:
280:
259:TU Darmstadt
104:
95:
85:
78:
71:
64:
52:
40:Please help
35:verification
32:
15:
668:Departments
615: /
476:Eric Bodden
344:Secure Data
213:approx. 170
202:IT-Security
135:Established
795:Categories
600:49°52′21″N
545:30 October
519:30 October
490:References
98:March 2020
68:newspapers
603:8°38′07″E
326:(CRISP).
240:Darmstadt
174:Directors
138:July 2008
693:Research
236:Location
219:Students
772:Related
757:Library
244:Germany
228:Address
197:Faculty
82:scholar
738:Campus
702:ATHENE
152:Budget
84:
77:
70:
63:
55:
307:Hesse
287:CASED
209:Staff
89:JSTOR
75:books
547:2019
521:2019
367:The
281:The
61:news
44:by
797::
538:.
507:.
293:,
242:,
223:28
649:e
642:t
635:v
549:.
523:.
285:(
111:)
105:(
100:)
96:(
86:·
79:·
72:·
65:·
38:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.