All Posts (2220)

Sort by

Codes and Isogenies

Two further methods for obtaining post-quantum security are discussed, namely code-based and isogeny-based cryptography.

Topic 1: Revocable Identity-based Encryption from Codes with Rank Metric (will be presented by Dr. Reza Azarderakhsh) Authors: Don

Read more…
Views: 53
Comments: 0

Exfiltrating Data through IoT

IoT offers a plethora of new protocols and frequencies over which communication travels. Protocols and services such as SSDP, P25, Zigbee, Z-Wave, WiFi and more provide countless ways to exfiltrate data or infiltrate the network. Through real-world e

Read more…
Views: 88
Comments: 0

Pulling Our SOCs Up

Vodafone is one of the world’s largest telecommunications companies, enabling connectivity by providing mobile, fixed and IoT networks to customers around the world. Vodafone is redefining the boundary of the SOC and sees the balance between preventi

Read more…
Views: 160
Comments: 0