1. Home
  2. /
  3. Research
  4. /
  5. Collaborative research

Collaborative research projects

Top-level research transcends disciplinary, organizational and geographic boundaries: Our researchers apply their expertise in innovative collaborative research projects.

With an internationally unique holistic-interdisciplinary approach, the scientists and researchers explore effective measures against powerful and large-scale cyber-attackers that can cause critical damage through technical expertise and broad financial resources. CASA is the place for groundbreaking IT security research in Germany.

The members of the interdisciplinary Collaborative Research Centre are investigating how sensory signals generate neural maps, resulting in complex behavior and memory formation. The goal is to apply a systems-oriented neuroscientific strategy to explore essential aspects of sensory processing.

We can learn that earlier knowledge is no longer relevant and adapt our behavior accordingly. Extinction learning involves both a forgetting of old information and a new learning process that is different from initial acquisition and considerably more complex. The CRC 1280 investigates the neural, behavioral, educational, ontogenetic, and clinical mechanisms of extinction learning.

In the Research Unit 2821, scientists are working on nine closely linked subprojects on scenario construction in episodic memory retrieval. They use methods from experimental psychology, philosophy, and computational neuroscience.

In addition to technical aspects of IT security, the SecHuman research college also investigates the opportunities and consequences for people, society and culture. The research takes place in an inter- and transdisciplinary environment: An innovative tandem concept combines research from a technical discipline with research from a social science or humanities discipline and enables practice-relevant IT security research

Encryption methods used today do not scale well and cannot easily be applied to larger amounts of data. For example, the security guarantees of the most commonly used RSA encryption decrease linearly with the number of users and ciphertexts. The goal of the project is to develop a toolbox for cryptographic methods that are suitable for large amounts of data and whose security levels can be adjusted on the fly.