Options
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC
A Systematic Review on Model Watermarking for Neural Networks
Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Sovereignly Donating Medical Data as a Patient: A Technical Approach
Activation Anomaly Analysis
Analyzing requirements for post quantum secure machine readable travel documents
Mobile Contactless Fingerprint Recognition: Implementation, Performance and Usability Aspects
Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis
The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment