Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Securing IoT connections by edge computing

A new reconfigurable security solution outperforms currently available ones in protecting Internet of things (IoT) devices and data by exploiting edge computing.

Security card with a one-time password and LED display

Infineon Technologies AG and Bundesdruckerei GmbH have developed a new security smart card with an LED display and a one-time password. This new technology is centred around a security chip in the card which generates a one-time ...

page 1 from 6