Prof Bill Buchanan OBE FRSEHomomorphic Encryption for Gray CodesWhen I studied electronic engineering, there was one code that was so simple to implement but could minimise the number of changes that we…9h ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Brainpool CurvesThe P256 curve is used extensively in cybersecurity, and it is likely that it is being used for network connection to this Web page. This…Sep 81
Tal Be'eryOnce and Forever: WhatsApp’s View Once Functionality is BrokenMeta’s WhatsApp suggests using “View once” media for privacy. We discovered attackers can and actually do bypass this limitation.Sep 91Sep 91
zk-Call & Digital Co.Quantum Tunneling: Breaking Barriers in Secure CommunicationLearn how Quantum Tunneling breaks barriers in secure communication: using quantum mechanics to develop fundamentally secure data channels.1d ago1d ago
Prof Bill Buchanan OBE FRSEThe End of Role-based Security and the Rise of Attribute-based SecurityThe Internet is over five decades old, and still, we have data breaches and cybersecurity compromises. One of the problems in this relates…Aug 238Aug 238
Prof Bill Buchanan OBE FRSEHomomorphic Encryption for Gray CodesWhen I studied electronic engineering, there was one code that was so simple to implement but could minimise the number of changes that we…9h ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Brainpool CurvesThe P256 curve is used extensively in cybersecurity, and it is likely that it is being used for network connection to this Web page. This…Sep 81
Tal Be'eryOnce and Forever: WhatsApp’s View Once Functionality is BrokenMeta’s WhatsApp suggests using “View once” media for privacy. We discovered attackers can and actually do bypass this limitation.Sep 91
zk-Call & Digital Co.Quantum Tunneling: Breaking Barriers in Secure CommunicationLearn how Quantum Tunneling breaks barriers in secure communication: using quantum mechanics to develop fundamentally secure data channels.1d ago
Prof Bill Buchanan OBE FRSEThe End of Role-based Security and the Rise of Attribute-based SecurityThe Internet is over five decades old, and still, we have data breaches and cybersecurity compromises. One of the problems in this relates…Aug 238
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHow Can We Determine If Bob Is Older Than Alice, Without Revealing Their Ages?The millionaire’s problem has been known for decades, and when two millionaires meet and want to know who has the most money but don’t want…Jul 306
Ali Irzam KathiainExponential Science FoundationUnderstanding Zero-Knowledge Proofs and Their Innovative Role in BlockchainEnhancing Privacy and Security in Blockchain2h ago
Patrick WalshinThe Salty HashAnalysis of Apple’s New AI Private Compute CloudThe Good and the Bad of Their Approach to Private Server-side LLMsJun 133