Covers the concept of biometrics, the process of enrolling and verifying biometrics, and the importance of balancing false positives and false negatives.
Covers side-channel analysis of isogeny-based key encapsulation mechanisms and hash-based digital signatures, focusing on vulnerabilities and security measures in cryptographic systems.
Explores dependability in industrial automation, covering reliability, safety, fault characteristics, and examples of failure sources in various industries.