Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a syst...
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the ...