Sie sind auf Seite 1von 1

Location and positioning systems

Navigation signal security, RFID, relay


attacks, distance bounding protocols

Application analysis

Banking security
Chip and PIN (EMV) security, ATM
phantom withdrawals

OTPW one-time password


authentication system

Privacy and freedom issues

Biometric identification
iris recognition, biometric cryptography

Security protocols

Compromising emanations
eavesdropping risks of video displays,
soft tempest, compromising video
emanations signal processor

SOAAP software analysis


LLVM-based compartmentalisation
analysis

Social networking and privacy

Cryptology (publications)
block ciphers (Serpent, BEAR, LION,
TEA, XTEA), stream ciphers
(Chameleon), hash functions (Tiger)

Steganography, information hiding,


digital watermarks

Electronic commerce

Anonymous communication

API security

Deterrence of deception

Economics of information security

Hardware security
microcontroller security, FPGAs, semiinvasive attacks on depackaged
semiconductor circuits, PIN mailer
security

Medical information security

Das könnte Ihnen auch gefallen