Options
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
Sovereignly Donating Medical Data as a Patient: A Technical Approach
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices
Machine learning of physical unclonable functions using helper data. Revealing a pitfall in the fuzzy commitment scheme
Decentralized Identities for Self-sovereign End-users (DISSENS)
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC
DA3G: Detecting Adversarial Attacks by Analysing Gradients
The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment
Mobile Contactless Fingerprint Recognition: Implementation, Performance and Usability Aspects
GAIA-X and IDS
Tapeout of a RISC-V crypto chip with hardware trojans: A case-study on trojan design and pre-silicon detectability