Related topics: security

Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Secure printing with water-based invisible ink

Researchers in China have developed a rewriteable paper coating that can encrypt secret information with relatively low-tech invisible ink—water. A message printed out by a water-jet printer on a manganese-complex-coated ...

Building trust in artificial intelligence

From telecommunications to road traffic, from healthcare to the workplace—digital technology is now an intrinsic part of almost every area of life. Yet how can we ensure that developments in this field, especially those ...

Roadmap for cyber security research

In their secUnity roadmap, 30 renowned European IT security experts of the BMBF-funded secUnity collaboration outlined how digital threats on the European level can be responded to more efficiently in the future. Among these ...

page 1 from 23