Jump to navigation
Every time we use online banking or log into a web application, we are transmitting sensitive data such as passwords and account information via the Internet. Currently, they are not one hundred per cent secure.
Integrating Trojans in computer chips is a time consuming and at the same time highly sophisticated attack method. They are almost impossible to detect - an advantage that intelligence agencies would love to exploit.
Even though a quantum computer does, as yet, remain pure theory, IT experts are able to determine how easily it could break common encryptions. They deploy a trick familiar used in logics.
Cars, fridges, household appliances – in the future, many everyday items will be online. That opens up numerous new targets for attacks. This is how the researchers from Bochum want to protect us.
Remote control of radiators or wireless door locks – the possibilities offered by interconnected devices are fascinating, but they have to be protected against hacker attacks.
Patient files might contain hints for detecting diseases at an early stage. But how can the collated data be evaluated without invading the patients’ privacy? With the help of mathematics.
In Colombia, large areas are teeming with mines. Finding them with traditional technologies is as good as impossible.
On many websites users are prompted to prove that they are human by entering symbols that are difficult to read. In case of partially sighted people, audio captchas are used, but there’s room for improvement.
Autonomous micro labs the size of cells that monitor chemical systems from the inside – pure fiction, as yet. But several crucial steps have been taken.
Anxiety and depression are two of the most frequently occurring mental disorders worldwide. Light-activated nerve cells may indicate how they are formed.
Visions of future technologies and lifestyles have influenced many research projects. More often than not, the researchers weren’t aware that they were skirting science fiction.
Humans are experts in facial perception. But not from birth. At which point do children become as skilled at it as adults?
Eike Kiltz studies the hardest problems in mathematics – research doesn’t get any more theoretical and abstract than that. A glimpse into his work routine.
IT security experts dream of unbreakable cryptographic algorithms. Vision or fantasy?
Maren Lorenz researches historical utopias of human breeding. She often sees links to the present.
The idea to improve humans and to optimise procreation emerged long before genetic engineering. As far back as the 18th century, concepts did exist that appear unthinkable from the modern perspective.
Non-contact mounting and manipulation of objects with the aid of light – it sounds like a vision from a science-fiction film. But it is daily routine at the Applied Laser Technologies lab.
Gunda Werner is the first woman to habilitate at the Faculty of Catholic Theology at RUB. For her research, she travelled a distance of 16,000 kilometres by bike through centres of ethnic conflict.
7.5 million children have a severely impaired sense of hearing. Detection at an early stage is important.
The ice-covered Mount Rainier welcomes its few visitors with an inhospitable world. Most people who come here stay only for one hour. Andreas Pflitsch stayed for a week and entered new scientific territory.