IT-Security: cryptography and steganography
secure protocols for multi-party computations, private computations,
steganography, steganalysis, data hiding,
interactive proof systems, Arthur-Merlin games, quantum computation
and quantum cryptography
Causality
algorithmic and computational complexity aspects of causality theory,
identification and estimation of causal effects,
graphical models for causal reasoning
Computational and structural complexity
alternating hierarchy, lower bounds for specific problems,
sublogarithmic space complexity classes, counting classes
Bioinformatics and algorithmic learning
Modeling and analysis of selection strategies of immune systems,
Artificial Immune Systems, computational immunology,
consensus patterns, sequenece analysis, compressing DNA sequences
Parallel algorithms
scheduling dynamic process graphs, transmission networks, sorting networks
Pattern Identifikation in Non-Homologous Protein Sequences
Joint DAAD research project of the Institute for Theoretical Computer Science , Universität zu Lubeck and Environmental Genomics Unit, National Environmental Engineering Research Institute, Nagpur 440020, India, 2003-2004
Theory of Information Transfer and Combinatorics Participation in the Project
Zentrum für interdisziplinäre Forschung (ZiF), Universität Bielefeld, 2001 - 2004
Problems in Complexity Theory
Project leader of the research grant KBN 2 1197 91 01 supported by KBN (Polish State Committee for Scienticic Research), 1994 - 1996 and main contractor of grant KBN 2 P301 034 07, 1992-1994