News

The Internet of Things, which includes wearables, appliances and cars, is collecting an increasing amount of information ...
In previous articles, we gave an overview about secure SoC architectures (Part I) , about the importance of key management (Part II) and secure boot (Part III) - the first line of defense. Part IV of ...
A recent research paper reveals worrisome gaps in physical security at four Dallas–Fort Worth area universities.