Embedded cryptographic systems, such as smart cards, require secure implementations that are robust to a variety of low-level attacks. Side-Channel Attacks (SCA) exploit the information such as power consumption, electromagnetic radiation and acoustic leak ...
Security in mobile communications is a topic of increasing relevance in everyday life. We all use mobile devices for everyday communications, maybe even for exchanging confidential information with the work place. This requires security systems that are re ...
Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The techni ...
Material classification is becoming more important in computer vision and digital photography applications, which require accurate classification of objects present in the imaged scene. This is a very challenging task because the sheer diversity of scene c ...
In this paper, we present a smart video surveillance system based on standard technologies and wired or wireless IP networking. The key novelty of the system is that it protects the privacy of people under surveillance. More specifically, a video analysis ...