Trials of Video on Demand and Pay-Per-View systems are underway in many countries, and as a result, many cable and telecommunications companies are having to upgrade or replace th...
Abstract. We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers. We propose a simple programming language to s...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement ...
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesm...