Chemist Anne Lüscher showed at 39C3 how synthetic DNA can be used for data storage and tamper-proof authentication.
Abstract: The explosion of IoT edge devices has made data security, authenticity, and integrity increasingly difficult to guarantee in settings with limited resources. Low-power Internet of Things ...
Abstract: Hash functions today are ubiquitous in nearly all kinds of cryptographic applications. They can be found at the core of digital fingerprinting or watermarking and even in block or stream ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results