<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://dud-video.inf.tu-dresden.de/about/instance</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/videos/local</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/w/cWpL2x6arjCBB2TxU73Jnz</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/60ad54b5-4e18-4abf-926f-a9276d51883b.jpg</video:thumbnail_loc><video:title>Einführung Proseminar Sicherheit in Computersystemen Sommersemester 2020</video:title><video:description>Einführung Proseminar Sicherheit in Computersystemen Sommersemester 2020</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/60ad54b5-4e18-4abf-926f-a9276d51883b</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/vYFksu4eRFdvMtXC7Mtu7J</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/f2c2e9e1-871f-4a31-b3af-8b8f5e9d34be.jpg</video:thumbnail_loc><video:title>Einführung Komplexpraktikum Kryptographie und Datenschutz</video:title><video:description>Einführung Komplexpraktikum Kryptographie und Datenschutz</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/f2c2e9e1-871f-4a31-b3af-8b8f5e9d34be</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/g1WGeD7Dc9q2xn1re89Xvo</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/799ac93d-9897-449c-813c-ce3fc95fda74.jpg</video:thumbnail_loc><video:title>Systemsicherheitslabor - Einführung</video:title><video:description>Einführung zur Lehrveranstaltung "Systemsicherheitslabor"</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/799ac93d-9897-449c-813c-ce3fc95fda74</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/boPhRhoH3iaD37ZPPQYRmH</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/542ae4b2-cfd3-4b3b-98d2-0e60381beef5.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Course 1</video:title><video:description>Security &amp; Cryptography II - Course 1</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/542ae4b2-cfd3-4b3b-98d2-0e60381beef5</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/pNC1GTuQyBNTZdBPmiJiZs</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/c0c4988b-7eae-49ed-bd87-e6c485c3bcc8.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Introduction</video:title><video:description>Security &amp; Cryptography II - Introduction</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/c0c4988b-7eae-49ed-bd87-e6c485c3bcc8</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/rFjjn2FkgYvCudQQgE68PU</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/cff1c2f3-d4ea-4935-a8db-f6cdfbd6de5e.jpg</video:thumbnail_loc><video:title>Systemsicherheitslabor: Ergänzungen zur Einführung Sommersemester 2020</video:title><video:description>Systemsicherheitslabor: Ergänzungen zur Einführung Sommersemester 2020</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/cff1c2f3-d4ea-4935-a8db-f6cdfbd6de5e</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/inX5xUXqfo59hCuJbFFJ4M</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/8cbbeb70-eef3-4ef7-8214-1ce485f54b0b.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Broadcast</video:title><video:description>Security &amp; Cryptography II - Broadcast</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/8cbbeb70-eef3-4ef7-8214-1ce485f54b0b</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/hSn3tVipVNcWixYpKQMd8M</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/889a6008-d9be-415a-9c23-4eb988d0f21b.jpg</video:thumbnail_loc><video:title>Systemsicherheitslabor: Brute Force</video:title><video:description>Systemsicherheitslabor: Brute Force</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/889a6008-d9be-415a-9c23-4eb988d0f21b</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/9uHEpVZ3kYfEpppLeVxK7Z</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/44cb9c31-e00a-47b3-90fe-cf9a8b084869.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II: Dummy Traffic for Sender Anonymity</video:title><video:description>Security &amp; Cryptography II: Dummy Traffic for Sender Anonymity</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/44cb9c31-e00a-47b3-90fe-cf9a8b084869</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/qpi6iDkT3miCZfDkCsNW8J</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/c59bf7b0-1f16-4fb9-a7ec-263f8840c3e8.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II: Ring Net - Protecting Sender and Recipient</video:title><video:description>Security &amp; Cryptography II: Ring Net - Protecting Sender and Recipient</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/c59bf7b0-1f16-4fb9-a7ec-263f8840c3e8</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/sh6uW12BmkyLsFwumk6WEU</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/d4cce4ed-12c0-4e89-aed0-34b2807eeee0.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Private Message Service for recipient anonymity</video:title><video:description>Security &amp; Cryptography II - Private Message Service for recipient anonymity</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/d4cce4ed-12c0-4e89-aed0-34b2807eeee0</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/99VZxJwMAVhK1FmdsJae96</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/42085553-d3fe-452e-affe-83781759cef1.jpg</video:thumbnail_loc><video:title>Soziologie des Datenschutzes</video:title><video:description>Vortrag von Martin Rost, ULD Schleswig-Holstein (Sommersemester 2011) </video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/42085553-d3fe-452e-affe-83781759cef1</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/2yrtHbV4wDdYMd2heeoZ9P</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/0ca0a3f9-a66c-485c-b5c4-31208c2a0de3.jpg</video:thumbnail_loc><video:title>Introduction to Literature Research in Computer Science</video:title><video:description>The slides presented in the video can be found [here](https://tu-dresden.de/ing/informatik/sya/ps/ressourcen/dateien/studium/lehrveranstaltungen/ss_dud/hauptseminar-technische-datenschutz/reading.pdf).</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/0ca0a3f9-a66c-485c-b5c4-31208c2a0de3</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/v8dJqwMXcCNWUASbyGxsDJ</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/ebdb12d4-5248-4b52-b150-b0421f14850c.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Some more information regarding anonymity in general</video:title><video:description>Security &amp; Cryptography II - Some more information regarding anonymity in general</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/ebdb12d4-5248-4b52-b150-b0421f14850c</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/cBAhJQqWC3uc2HZaTacH34</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/5e0cb034-ed60-415b-bec6-ea87efecbd23.jpg</video:thumbnail_loc><video:title>WFCS 2020 - Enabling and Optimizing MACsec for Industrial Environments</video:title><video:description>WFCS 2020 - Enabling and Optimizing MACsec for Industrial Environments</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/5e0cb034-ed60-415b-bec6-ea87efecbd23</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/xk1jX7osXPxe5EbiNNKoXK</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/fdb2a1a6-35e5-45c5-b504-0346aff8eb51.jpg</video:thumbnail_loc><video:title>To track or not to track — Datenschutz in Zeiten von Stop-Corona-Apps</video:title><video:description>To track or not to track — Datenschutz in Zeiten von Stop-Corona-Apps</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/fdb2a1a6-35e5-45c5-b504-0346aff8eb51</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/vUanhk9gpuc1zEV9Pfagks</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/f2217841-9e9f-4148-ae83-2b134ec29aac.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - DC-Net - Part 1</video:title><video:description>Security &amp; Cryptography II - DC-Net - Part 1</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/f2217841-9e9f-4148-ae83-2b134ec29aac</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/i1rS9QRk8wAQhBuzo5b9LD</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/89bb4c02-07a4-45d5-9299-48b54d03500d.jpg</video:thumbnail_loc><video:title>HotPost2020 - German-Speaking Twitter Community Dataset</video:title><video:description>HotPost2020 - German-Speaking Twitter Community Dataset</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/89bb4c02-07a4-45d5-9299-48b54d03500d</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/gQueAv7uNscBzoCRGpcYDv</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/803e2e51-0000-4f4d-9e15-5c338b39f5c7.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - DC-Net - Part 2</video:title><video:description>Security &amp; Cryptography II - DC-Net - Part 2</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/803e2e51-0000-4f4d-9e15-5c338b39f5c7</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/8xt66PKCvdGG6Q73aUrDMH</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/3d14b895-152e-4766-beb1-2f940e4685d7.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Mix Networks - Part 1</video:title><video:description>Security &amp; Cryptography II - Mix Networks - Part 1</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/3d14b895-152e-4766-beb1-2f940e4685d7</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/b3iVkJfEAWCzV9xbrrWQH2</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/514deae2-ad7d-47d8-b269-2390a423b9ab.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Mix Networks - Part 2</video:title><video:description>Security &amp; Cryptography II - Mix Networks - Part 2</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/514deae2-ad7d-47d8-b269-2390a423b9ab</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/qqyjfxo6zUGUPHkrv5Ak1V</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/c5c917ca-fcaf-4cca-b88d-c1a0ae903d51.jpg</video:thumbnail_loc><video:title>Introduction to Peer Review in Computer Science</video:title><video:description>The slides of the video can be found [here](https://tu-dresden.de/ing/informatik/sya/ps/ressourcen/dateien/studium/lehrveranstaltungen/ss_dud/hauptseminar-technische-datenschutz/review.pdf).</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/c5c917ca-fcaf-4cca-b88d-c1a0ae903d51</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/uEfvy8HguFxYXvnbbj54wY</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/e817166a-e919-4a0d-8ef9-8ce641383070.jpg</video:thumbnail_loc><video:title>Systemsicherheitslabor - Bekannte Schwachstellen - Metasploit, nmap &amp; OpenVAS</video:title><video:description>Systemsicherheitslabor - Bekannte Schwachstellen - Metasploit, nmap &amp; OpenVAS</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/e817166a-e919-4a0d-8ef9-8ce641383070</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/ayqq5XwQ8CcZApj6dY5Jeg</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/4d691853-67ac-4f9a-bb4e-e387e8dbb5c9.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Comparison of Schemes &amp; Arranging into the OSI Layers</video:title><video:description>Security &amp; Cryptography II - Comparison of Schemes &amp; Arranging into the OSI Layers</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/4d691853-67ac-4f9a-bb4e-e387e8dbb5c9</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/e7jptNnvQYA5N3wN3PcoLF</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/6a289b89-bc87-43ae-9d4a-e673595b449f.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - OSI Layers Part 2 &amp; Upgrade of existing Networks</video:title><video:description>Security &amp; Cryptography II - OSI Layers Part 2 &amp; Upgrade of existing Networks</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/6a289b89-bc87-43ae-9d4a-e673595b449f</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/tawecy6HDs9mRSdQx6MxMb</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/dbfb10ef-6815-4594-8713-ef7605dd0050.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - ISDN Mixes</video:title><video:description>Security &amp; Cryptography II - ISDN Mixes</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/dbfb10ef-6815-4594-8713-ef7605dd0050</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/eEQNWsP1e2vX3NLmwkrTgu</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/6eb32548-5eb7-4ae7-92d2-ef55559bd186.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Anonymity &amp; Network Termination</video:title><video:description>Security &amp; Cryptography II - Anonymity &amp; Network Termination</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/6eb32548-5eb7-4ae7-92d2-ef55559bd186</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/cMLmYLg2roXA5hGeGtyxPA</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/5f785572-954f-44a6-a963-25f7f4773614.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Anonymity in Radio Networks</video:title><video:description>Security &amp; Cryptography II - Anonymity in Radio Networks</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/5f785572-954f-44a6-a963-25f7f4773614</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/w1mExivPH9NgqbK5D1vk8w</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/f2fee50d-7113-4bcc-b937-4edccbc13488.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Introduction to Electronic Banking</video:title><video:description>Security &amp; Cryptography II - Introduction to Electronic Banking</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/f2fee50d-7113-4bcc-b937-4edccbc13488</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/w6B6Pg8RDRNedcPkpTAG4F</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/f3ba828c-258b-4171-9a99-3018eee9ce95.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Electronic Banking, Pseudonyms Anonymous Value Exchange &amp; Anonymous ...</video:title><video:description>Security &amp; Cryptography II - Electronic Banking, Pseudonyms Anonymous Value Exchange &amp; Anonymous Credentials</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/f3ba828c-258b-4171-9a99-3018eee9ce95</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/vSfm6H8zTFFyKkMbHHbAvL</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/f1dd0d0e-508f-4c9d-bee4-3421dbd96946.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Value Exchange, Offline anonymous Payments &amp; Anonymous Credentials -...</video:title><video:description>Security &amp; Cryptography II - Value Exchange, Offline anonymous Payments &amp; Anonymous Credentials - Part II</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/f1dd0d0e-508f-4c9d-bee4-3421dbd96946</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/1y21Q9FFYHfu5kvpSdXdak</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/04786cfc-d213-4b7b-a156-446b17217fa5.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography II - Steganography &amp; The Impossibility to regulate Cryptography in a mean...</video:title><video:description>Security &amp; Cryptography II - Steganography &amp; The Impossibility to regulate Cryptography in a meaningful way</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/04786cfc-d213-4b7b-a156-446b17217fa5</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/skMvQEs8Fp2cobV4LWwFED</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/d550c93c-44b7-4286-938c-daef931b5c0d.jpg</video:thumbnail_loc><video:title>UWB CIR Messungen mit DecaWave EVK1000 und Lego Mindstorm</video:title><video:description>UWB CIR Messungen mit DecaWave EVK1000 und Lego Mindstorm</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/d550c93c-44b7-4286-938c-daef931b5c0d</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/rLuCJxsZepBXFsb91FFKdU</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/d0aad69a-d4d9-4128-bbbf-d4c6eb220080.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Protection Goals (Part 1)</video:title><video:description>Security &amp; Cryptography I: Protection Goals (Part 1)</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/d0aad69a-d4d9-4128-bbbf-d4c6eb220080</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/m9qdF2aCgeLBBLhqDn6DqZ</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/a323a606-98da-4332-bf4f-c03cd4955515.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Protection Goals (Part 2)</video:title><video:description>Security &amp; Cryptography I: Protection Goals (Part 2)</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/a323a606-98da-4332-bf4f-c03cd4955515</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/k4iCvPMbvC81vENVjdoFQ2</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/9a53bafe-b87a-42d6-8c09-1ce4487b2b0d.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Universal Trojan Horse</video:title><video:description>Security &amp; Cryptography I: Universal Trojan Horse</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/9a53bafe-b87a-42d6-8c09-1ce4487b2b0d</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/kjawLXYZNkGJ4NFjfr6ebZ</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/9c66e556-23d7-43cd-9b32-3b032057c369.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Attacker Model</video:title><video:description>Security &amp; Cryptography I: Attacker Model</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/9c66e556-23d7-43cd-9b32-3b032057c369</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/mKmHi1G1YJHXXSsHxdG1Ch</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/a80484fe-4290-4dbe-a9cd-4701989516d8.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Multilateral Security</video:title><video:description>Security &amp; Cryptography I: Multilateral Security</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/a80484fe-4290-4dbe-a9cd-4701989516d8</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/hke33QeyigpwSn2H6xy4Gm</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/8441622c-a942-4e1b-a481-98b6653c2a60.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Physical Security Assumptions</video:title><video:description>Security &amp; Cryptography I: Physical Security Assumptions</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/8441622c-a942-4e1b-a481-98b6653c2a60</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/dYsiMeNRaiQa2PHGSnzmtj</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/690f86eb-4f11-4a50-9acf-c19b69127d38.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Authentication</video:title><video:description>Security &amp; Cryptography I: Authentication</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/690f86eb-4f11-4a50-9acf-c19b69127d38</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/e6rfhpbNusXFy2syTp7szu</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/6a09147a-0607-4497-a93b-e0234012a37e.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Final thoughts on security in single computers / Begin Distributed Sys...</video:title><video:description>Security &amp; Cryptography I: Final thoughts on security in single computers / Begin Distributed Systems</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/6a09147a-0607-4497-a93b-e0234012a37e</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/uFtbxUtoKV4WEpk2Wy3r3t</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/e842a415-440c-4b5d-84b5-5ae79118cfe3.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Basics about security in distributed systems // Availability</video:title><video:description>Security &amp; Cryptography I: Basics about security in distributed systems // Availability</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/e842a415-440c-4b5d-84b5-5ae79118cfe3</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/xfydhwMGN37sWo6cZQx6bp</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/fd138ffe-3f7f-4d9a-a9eb-5791dbbd75c7.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Start of Cryptography &amp; Symmetric Encryption</video:title><video:description>Security &amp; Cryptography I: Start of Cryptography &amp; Symmetric Encryption</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/fd138ffe-3f7f-4d9a-a9eb-5791dbbd75c7</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/kwRL44K5FnL8DunAdZ7Am2</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/9e2c9cf0-3cf1-42b5-8c30-b77befa88751.jpg</video:thumbnail_loc><video:title>Komplexpraktikum Kryptographie und Datenschutz: Friedman Test</video:title><video:description>Komplexpraktikum Kryptographie und Datenschutz: Friedman Test</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/9e2c9cf0-3cf1-42b5-8c30-b77befa88751</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/vD5mHaWwzzJT6uXnprtukU</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/f00639cb-e206-4689-8dbf-b8600ed0bd5a.jpg</video:thumbnail_loc><video:title>ESORICS 2020 - MPS - Twizzle Benchmarking Framework - Stephan Escher</video:title><video:description>ESORICS 2020 - MPS - Twizzle Benchmarking Framework - Stephan Escher</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/f00639cb-e206-4689-8dbf-b8600ed0bd5a</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/5inXa3u9rTtCPTanPi3rHy</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/22d1b9fb-63e6-474b-9e87-0c4fc8e24f6e.jpg</video:thumbnail_loc><video:title>ESORICS 2020 - MPS - Privacy friendly Face Recognition Reloaded - Patrick Teufert</video:title><video:description>ESORICS 2020 - MPS - Privacy friendly Face Recognition Reloaded - Patrick Teufert</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/22d1b9fb-63e6-474b-9e87-0c4fc8e24f6e</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/gZ28bzz7pP5gRjkajcmr8d</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/816f2ad9-3e30-49cb-90c1-6919053a41f6.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Information Theoretic Security &amp; One Time Pad</video:title><video:description>Security &amp; Cryptography I: Information Theoretic Security &amp; One Time Pad</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/816f2ad9-3e30-49cb-90c1-6919053a41f6</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/sq8dmpXijMLByhgu2uSiv2</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/d5ebe699-fbcb-4153-b92a-9a1aa5d37da7.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Key Distribution using Symmetric Cryptography</video:title><video:description>Security &amp; Cryptography I: Key Distribution using Symmetric Cryptography</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/d5ebe699-fbcb-4153-b92a-9a1aa5d37da7</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/vSYhPSRdi76FkzvH11usvq</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/f1f6e64e-fcc8-4f1e-80e9-f02354a13c72.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Asymmetric Encryption &amp; Key Exchange using Asymmetric Encryption</video:title><video:description>Security &amp; Cryptography I: Asymmetric Encryption &amp; Key Exchange using Asymmetric Encryption</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/f1f6e64e-fcc8-4f1e-80e9-f02354a13c72</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/t6BXSyQNuow5FM7QYvL6cT</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/db6fa037-674d-47d8-9e8c-12a508d44715.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Symmetric Authentication Systems</video:title><video:description>Security &amp; Cryptography I: Symmetric Authentication Systems</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/db6fa037-674d-47d8-9e8c-12a508d44715</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/a3X4RudBzH4wzRaCbFDcQy</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/494babdf-4d93-41a7-ae5a-939890b1c384.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Digital Signatures &amp; More on Key Distribution</video:title><video:description>Security &amp; Cryptography I: Digital Signatures &amp; More on Key Distribution</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/494babdf-4d93-41a7-ae5a-939890b1c384</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/nCGGM43DknUAFoLXSp5Gps</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/af2fc58f-b735-454d-9ff6-82e799164b00.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Key Generation &amp; Some final Remarks on Key Exchange</video:title><video:description>Security &amp; Cryptography I: Key Generation &amp; Some final Remarks on Key Exchange</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/af2fc58f-b735-454d-9ff6-82e799164b00</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/q2JR2DLt9Gkk7DCpV3Qxp9</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/c29979d9-85bf-455a-93d4-f96de07be71a.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I:  Goals and Types of Attacks</video:title><video:description>Security &amp; Cryptography I:  Goals and Types of Attacks</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/c29979d9-85bf-455a-93d4-f96de07be71a</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/iWN1nfQLRGq2xYtcadZVH5</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/9151df8a-1a83-4bad-aae3-1cf02051964a.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Basic Facts about "Cryptographical Strong"</video:title><video:description>Security &amp; Cryptography I: Basic Facts about "Cryptographical Strong"</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/9151df8a-1a83-4bad-aae3-1cf02051964a</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/gcKnc248w8HxDpDoEYFaoc</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/7b1cfc78-7136-42e1-a406-15dffa3d23a3.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I:  Security Classes of Cryptographic Systems</video:title><video:description>Security &amp; Cryptography I:  Security Classes of Cryptographic Systems</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/7b1cfc78-7136-42e1-a406-15dffa3d23a3</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/j4CnGSYVFgMTBKVzRrA9pX</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/924624c2-f643-4628-91a0-e05353de09cd.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I:  Overview of Cryptographic Systems</video:title><video:description>Security &amp; Cryptography I:  Overview of Cryptographic Systems</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/924624c2-f643-4628-91a0-e05353de09cd</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/sE4t3xnJH47Mu4FTvXhjKF</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/d7de012c-8dc4-405d-9970-7420cee041bd.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Hybrid Cryptographic Systems</video:title><video:description>Security &amp; Cryptography I: Hybrid Cryptographic Systems</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/d7de012c-8dc4-405d-9970-7420cee041bd</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/in82kCnmd3VhT3gVySc92D</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/8c9e4df4-a239-4470-91ac-9b1bb6e1cb17.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: In depth reasoning about Information Theoretic Secure</video:title><video:description>Security &amp; Cryptography I: In depth reasoning about Information Theoretic Secure</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/8c9e4df4-a239-4470-91ac-9b1bb6e1cb17</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/aya1LdgejMN5zMrqDLXF1b</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/4d5f9a66-7cb3-4122-9751-b353bd46117e.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Symmetric Authentication Codes</video:title><video:description>Security &amp; Cryptography I: Symmetric Authentication Codes</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/4d5f9a66-7cb3-4122-9751-b353bd46117e</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/vuzPowxb8WW99cgxxkTojj</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/eed6afeb-ccf5-4f3b-b006-2dd61060fc06.jpg</video:thumbnail_loc><video:title>Betriebssysteme und Sicherheit: Transitive Fehlerausbreitung, Trojanische Pferde, Angreifer</video:title><video:description>Betriebssysteme und Sicherheit: Transitive Fehlerausbreitung, Trojanische Pferde, Angreifer</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/eed6afeb-ccf5-4f3b-b006-2dd61060fc06</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/o4pSaJd2DZFViQCHEC2WQN</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/b2a2fd37-e875-40ae-841e-db495551770e.jpg</video:thumbnail_loc><video:title>Betriebssysteme und Sicherheit: Angreifermodell</video:title><video:description>Betriebssysteme und Sicherheit: Angreifermodell</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/b2a2fd37-e875-40ae-841e-db495551770e</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/x8z7Dboo5MTAdfoYEJ1vZY</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/fc19e992-19eb-4c58-9992-b5e5c036ff96.jpg</video:thumbnail_loc><video:title>Betriebssysteme und Sicherheit: Mehrseitige Sicherheit, Physische Sicherheitsanker</video:title><video:description>Betriebssysteme und Sicherheit: Mehrseitige Sicherheit, Physische Sicherheitsanker</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/fc19e992-19eb-4c58-9992-b5e5c036ff96</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/jW6zg9UD26CWyQR1GZgx8D</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/9952181f-a448-445e-b7e8-a2fd6fc9a57f.jpg</video:thumbnail_loc><video:title>Betriebssysteme und Sicherheit: Datenschutz</video:title><video:description>Betriebssysteme und Sicherheit: Datenschutz</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/9952181f-a448-445e-b7e8-a2fd6fc9a57f</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/jbdZg8JnpG5dgnHvUJzcVi</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/9331eff0-5da6-44f0-89dc-d496538393a7.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Introduction to Math for asymmetric cryptography</video:title><video:description>Security &amp; Cryptography I: Introduction to Math for asymmetric cryptography</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/9331eff0-5da6-44f0-89dc-d496538393a7</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/uWqqCSZKfdE6odozEVycs1</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/ea59192d-7de8-49a6-9bf2-baf1b20c26c0.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Factoring</video:title><video:description>Security &amp; Cryptography I: Factoring</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/ea59192d-7de8-49a6-9bf2-baf1b20c26c0</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/eHCj9F8DavEj3TT1oFtgZe</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/6f16ad00-2fb0-472b-a1c8-fbb59283d3fb.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Prime Numbers</video:title><video:description>Security &amp; Cryptography I: Prime Numbers</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/6f16ad00-2fb0-472b-a1c8-fbb59283d3fb</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/f4mrK94tSB1V64Ena27BVo</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/71d7c582-ab6e-4f06-aed1-d38cc2f19fe4.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Efficient Exponentiation &amp; Euclidean Algorithm</video:title><video:description>Security &amp; Cryptography I: Efficient Exponentiation &amp; Euclidean Algorithm</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/71d7c582-ab6e-4f06-aed1-d38cc2f19fe4</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/25pWhcZ9KXCTzQsKsrqrKQ</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/08b6dd5f-242a-4e98-acf0-c7c24c0de2c2.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Number of Elements in Z*n</video:title><video:description>Security &amp; Cryptography I: Number of Elements in Z*n</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/08b6dd5f-242a-4e98-acf0-c7c24c0de2c2</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/2qkbNuWaAwQed5SinyHVS5</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/0b7ed025-e4b5-44b2-98a7-d3fa34092394.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I:  Chinese Remainder Theorem</video:title><video:description>Security &amp; Cryptography I:  Chinese Remainder Theorem</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/0b7ed025-e4b5-44b2-98a7-d3fa34092394</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/11EsehouQB4Vy8KtHDrVHf</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/0017b270-3e48-4b56-bd42-0e2f7a29b8e4.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I:  Squares and Roots (Part-I) / Jacobi Symbol</video:title><video:description>Security &amp; Cryptography I:  Squares and Roots (Part-I) / Jacobi Symbol</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/0017b270-3e48-4b56-bd42-0e2f7a29b8e4</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/3dkMYUpKPRPQ7VDKTpEW2o</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/11eb6679-921f-49b5-82f7-51148e322d68.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Squares and Roots (Part II)</video:title><video:description>Security &amp; Cryptography I: Squares and Roots (Part II)</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/11eb6679-921f-49b5-82f7-51148e322d68</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/6TLKTD7R8Kdy5FFk4swYi2</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/2fb83537-f13c-4ec4-ac64-640b92fc582b.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Squares and Roots (Part III) - Calculations without p and q</video:title><video:description>Security &amp; Cryptography I: Squares and Roots (Part III) - Calculations without p and q</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/2fb83537-f13c-4ec4-ac64-640b92fc582b</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/6TXRgw7TaUQ8hJFTGtNvNZ</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/2fbf0b44-4b06-4c6d-a3da-a761445f5ad9.jpg</video:thumbnail_loc><video:title>Betriebssysteme und Sicherheit: Kryptographie - RSA</video:title><video:description>Betriebssysteme und Sicherheit: Kryptographie - RSA</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/2fbf0b44-4b06-4c6d-a3da-a761445f5ad9</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/twWtuYEnrz3RxmkLeEVMuY</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/def8a0b7-3942-4773-8f69-6bfceaeac22c.jpg</video:thumbnail_loc><video:title>Betriebssysteme und Sicherheit: Sicherheitsprotokolle (TLS, IPSec, Wireguard)</video:title><video:description>Betriebssysteme und Sicherheit: Sicherheitsprotokolle (TLS, IPSec, Wireguard)</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/def8a0b7-3942-4773-8f69-6bfceaeac22c</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/vt2NmdZ36fatGGsaKWTJ53</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/ee9f3630-425b-4b24-a4cc-e54ef15e174a.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: s^2 mod n generator (Blum-Blum-Shub)</video:title><video:description>Security &amp; Cryptography I: s^2 mod n generator (Blum-Blum-Shub)</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/ee9f3630-425b-4b24-a4cc-e54ef15e174a</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/bGLfqzavaX6Q9TfzJUnmYr</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/56ac6818-40d8-4700-b8b9-a098048608a1.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: s^2 mod n Generator - Security Proof</video:title><video:description>Security &amp; Cryptography I: s^2 mod n Generator - Security Proof</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/56ac6818-40d8-4700-b8b9-a098048608a1</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/cLaX7AU8bpd84u8dpt8fMk</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/5f3f6218-e0d7-416f-958d-a3454468f5e5.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: RSA</video:title><video:description>Security &amp; Cryptography I: RSA</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/5f3f6218-e0d7-416f-958d-a3454468f5e5</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/qJ8o1GvhxLKYwDasrmSboe</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/c83d1d2d-16c1-49e0-a8da-6bb62535d021.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Active Attacks on RSA</video:title><video:description>Security &amp; Cryptography I: Active Attacks on RSA</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/c83d1d2d-16c1-49e0-a8da-6bb62535d021</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/nTRe7f8oVJAkLZnct5qdzr</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/b14d2e44-15e3-47cf-8431-3ee5cdc62363.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: DES</video:title><video:description>Security &amp; Cryptography I: DES</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/b14d2e44-15e3-47cf-8431-3ee5cdc62363</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/2Pe1sAhNz9cSoHuHraNPWE</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/0eb11cbc-cfdc-411a-89ed-b9ad4e2b269e.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Modes of Operation</video:title><video:description>Security &amp; Cryptography I: Modes of Operation</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/0eb11cbc-cfdc-411a-89ed-b9ad4e2b269e</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/ae564KVkMUdrDfi4pDbH1e</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/4ab56f94-0aa6-4c0d-8676-3b2efb406e51.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Collision-resistant Hash Function from Deterministic Block Cipher</video:title><video:description>Security &amp; Cryptography I: Collision-resistant Hash Function from Deterministic Block Cipher</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/4ab56f94-0aa6-4c0d-8676-3b2efb406e51</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/itbduAa4NsgY7J3ekdamGi</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/8d76bc06-4552-46b3-b28b-edadb0845739.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Discrete Log Assumption and Diffie Hellman Key Agreement</video:title><video:description>Security &amp; Cryptography I: Discrete Log Assumption and Diffie Hellman Key Agreement</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/8d76bc06-4552-46b3-b28b-edadb0845739</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/5PZgR4GbkMrufaDTjEsG5e</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/2717cec5-3add-40e3-9694-c561198c8c85.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Some additional remarks regarding DH-Key Agreement</video:title><video:description>Security &amp; Cryptography I: Some additional remarks regarding DH-Key Agreement</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/2717cec5-3add-40e3-9694-c561198c8c85</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/v7Qk7bWmoFv22KUufmrU7W</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/ebcd4490-48fc-4c4d-a237-dca174f840ca.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Fail Stop, Undeniable and Blind Signatures</video:title><video:description>Security &amp; Cryptography I: Fail Stop, Undeniable and Blind Signatures</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/ebcd4490-48fc-4c4d-a237-dca174f840ca</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/9tyQao41YV9H3Xct6P18nw</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/44a26c6a-f6b9-45ec-9ee4-e7f93e326e2c.jpg</video:thumbnail_loc><video:title>Security &amp; Cryptography I: Threshold Schemes</video:title><video:description>Security &amp; Cryptography I: Threshold Schemes</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/44a26c6a-f6b9-45ec-9ee4-e7f93e326e2c</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/fGXhWAX4AMEBr2LEGvAq1F</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/7717c45a-51ee-4e70-ac7a-f8b4f996a327.jpg</video:thumbnail_loc><video:title>How well can your car be tracked: Analysis of the european C-ITS pseudonym scheme</video:title><video:description>The change of pseudonym certificates for message authentication is the standard approach for privacy-friendly V2X communication. It’s crucial to use an effective and robust pseudonym changing scheme as the location privacy of vehicles relies strongly on it. Therefore, in this work we analyzed a pseudonym change strategy that is recommended by the European C-ITS platform and has good chances to be included in a future European standard. By simulating a realistic urban traffic scenario within Luxembourg, applying and attacking the pseudonym change strategy, we could evaluate the effectiveness of the scheme. Overall, linking pseudonyms with simple traffic statistics in a realistic city traffic scenario is more challenging than related work suggests. However, the consideration of additional static information from the V2X communication, such as length and width of the vehicle, enormously improves the linking of pseudonyms, and thus enables tracking of vehicles and generation of motion profiles. The level of location privacy is thereby particularly influenced by the number of vehicles in the vicinity and especially their properties, as well as, of course, by the observation capabilities of the attacker. Our results suggest that the introduction of VANETs, even with the C-ITS pseudonym scheme, enables the tracking of vehicles, and thus will decrease location privacy in the future.</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/7717c45a-51ee-4e70-ac7a-f8b4f996a327</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/aFmepHhhfA51J4JpUQGjpT</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/4e60b90e-c54f-4165-9926-ed1d55a72f71.jpg</video:thumbnail_loc><video:title>Martin Rost (ULD): Soziologische Thesen zum Datenschutz (2021)</video:title><video:description>Martin Rost (ULD): Soziologische Thesen zum Datenschutz (2021)</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/4e60b90e-c54f-4165-9926-ed1d55a72f71</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/mX9cXnyERPrgKLH1uhyjR1</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/a9a9bcdd-0d80-40be-a9ae-5a169ff9f7a2.jpg</video:thumbnail_loc><video:title>Damoc_Movie</video:title><video:description>Damoc_Movie</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/a9a9bcdd-0d80-40be-a9ae-5a169ff9f7a2</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/w/epRrD2MZXvdMirNc1tzwGj</loc><video:video><video:thumbnail_loc>https://dud-video.inf.tu-dresden.de/static/thumbnails/6c9b6108-2f69-405f-bc5a-708ad8b1d1f2.jpg</video:thumbnail_loc><video:title>IoT_Transparency</video:title><video:description>IoT_Transparency</video:description><video:player_loc>https://dud-video.inf.tu-dresden.de/videos/embed/6c9b6108-2f69-405f-bc5a-708ad8b1d1f2</video:player_loc></video:video></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/root_channel</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/sk13_channel</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/prosemsic</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/komplexpraktikum_kryptographie</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/sac2</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/pentestlab</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/martin.byrenheid_channel</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/iug</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/tim.lackorzynski_channel</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/wfcs_2020</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/stephan.escher_channel</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/paul.walther_channel</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/saci</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/bus</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/profilunterricht</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/ef1_channel</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/video-channels/amr_channel</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/accounts/peertube</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/accounts/root</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/accounts/sk13</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/accounts/martin.byrenheid</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/accounts/tim.lackorzynski</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/accounts/stephan.escher</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/accounts/paul.walther</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/accounts/ef1</loc></url><url><loc>https://dud-video.inf.tu-dresden.de/accounts/amr</loc></url></urlset>