Cybersecurity

Quarks: decentralized and blockchain-secured instant messaging

Read the article

The Trust System Cybersecurity Challenge: Protection without Impacting User Experience

Read the article

Monitoring the Security of Connected Personal Equipment in Real Time: How Could It Work?

Read the article

Lightweight cryptography for strong security of the Internet of Things

Read the article

IAlerting: Protecting Customers from Online Piracy

Read the article

Mobile Private Networks on the Way to 5G

Read the article
smartphone et caméra connectée

IoT Security Requires Strict Monitoring Every Step of the Way, From Design to Operation

Read the article