Roadmap for cyber security research

In their secUnity roadmap, 30 renowned European IT security experts of the BMBF-funded secUnity collaboration outlined how digital threats on the European level can be responded to more efficiently in the future. Among these ...

Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

Data transfer by controlled noise

In information technology, multiplexing schemes are used to transmit more signals than the number of available transmission channels. Researchers at ETH in Zurich have invented a novel method whereby information is encoded ...

page 7 from 291