Object Authentication in the Context of the Internet of Things: A Survey
Our latest journal abstract: Object Authentication in the Context of the Internet of Things: A Survey
Read moreOur latest journal abstract: Object Authentication in the Context of the Internet of Things: A Survey
Read moreThe CJEU’s decision on Schrems II declared Privacy Shield invalid. The implications cannot be foreseen, but it is clearly a win for data privacy. Read what experts say on the ruling.
Read moreCryptography is the last line of defense – and quantum computers will break that defense. Read what software company SAP will do to prevent this from happening.
Read moreIn the second episode of our editorial podcast on 5G security, we elaborate on the need of virtualization for 5G. On one hand, being software-based, virtualization makes 5G networks more vulnerable, while also vritualization opens up more possibilities for securing mobile networks.
Read moreOur latest journal abstract: Reaction of Stock Volatility to Data Breach: an Event Study
Read moreInsecure devices from the home networks might infect the corporate infastructure when we return to the office. We’ve had the chance to talk to Matthias Canisius about what strategies are best to securely go back to work.
Read moreOur latest journal abstract: Noise-Resilient Neural Network-Based Adversarial Attack Modeling for XOR Physical Unclonable Functions
Read moreOur latest journal abstract: Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid
Read moreSee our discussion with Eddy Willems, renowned security specialist and book author, about todays security landscape and how to protect yourself in it.
Read moreIn our first edition of a series, we’re giving an overview of 5G security and what it means for the future. Further in the series, we’re deep diving into the different topics of 5G security.
Join our editors Dr. Anand Prasad, Patrick Boch and Rajeev in understanding the full impact of 5G security.