Related topics: security

Monitoring system protects trial crops

The world is having to feed an increasing number of mouths. Studies indicate that global population will rise to over nine billion by the year 2050. In response, Bayer AG is researching resistant cereal varieties and enhanced ...

Semi-random scattering of light

What is the exact path of light inside a highly scattering material like white paint? This is a question that is impossible to answer, as the particles inside the paint are distributed randomly. This, at the same time, is ...

Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Building trust in artificial intelligence

From telecommunications to road traffic, from healthcare to the workplace—digital technology is now an intrinsic part of almost every area of life. Yet how can we ensure that developments in this field, especially those ...

Roadmap for cyber security research

In their secUnity roadmap, 30 renowned European IT security experts of the BMBF-funded secUnity collaboration outlined how digital threats on the European level can be responded to more efficiently in the future. Among these ...

page 8 from 36