Design, Automation and Test in Europe Conference (DATE 2007), 2007

Blue safe with many locks

Design Methods for Security and Trust

by Ingrid Verbauwhede and Patrick Schaumont

In recent years, the mass media has repeatedly covered horror stories that describe abuse of electronic wireless tags (RFID). Weaknesses have been demonstrated that break the RFID's security by observation of RF signals, by clever cryptanalysis, or by software hacks. These hacks demonstrate that, as we delegate more tasks to embedded electronics, we need these electronics to become trustworthy. An electronic ID card for example has to protect our personal information: it may release that information only to authorized persons. Read More »

Bookmark and Share

Also this month

Computing Now