Magic of Security

Search
Skip to content
  • I and My Projects
  • KeyChest
  • CloudFoxy Signing

Daily Archives: 6th October 2019

key management, security

Security of Sensor Networks (2008)

6th October 2019 Dan Cvrcek Leave a comment

The WINES Infrastructure project deployed wireless sensor networks to monitor large bridges (Humber bridge), tunnels (London Underground), and water systems. Our task in the project was to perform a detailed analysis of security issues in existing hardware and software platforms for wireless sensor networks.

Continue reading Security of Sensor Networks (2008) →
passwords, security

Trusted Path for Smart Cards

6th October 2019 Dan Cvrcek 1 Comment

The main problem with smart cards is lack of secure display and keyboard that would allow users to verify data sent to the smart card from their computer. Malware on the computer may then alter the data and, for example, change the recipient of a bank transfer.

Continue reading Trusted Path for Smart Cards →
security

Privacy in Common Criteria

6th October 2019 Dan Cvrcek Leave a comment

Still at Cambridge Uni, Vashek Matyas and myself looked at the definition of privacy in the Common Criteria standard. With Snowden and Echelon some years later, our definitions of unlikable anonymity and pseudonymity make even more sense.

Continue reading Privacy in Common Criteria →
key management, security

Chrysalis Luna CA3

6th October 2019 Dan Cvrcek Leave a comment

I moved some of the contents from an old website of mine. This is one of a small projects back from my time at the University of Cambridge, where we hacked a Chrysalis Luna CA3, which would now be part of SafeNet HSM portfolio.

Continue reading Chrysalis Luna CA3 →

Search the blog

October 2019
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Aug   Nov »

"Any sufficiently advanced technology is indistinguishable from magic." A. C. Clark

Direct Links

  • I and My Projects
  • KeyChest
  • CloudFoxy Signing

Recent Posts

  • Partial Passwords Done Right 6th December 2021
  • Java Spring Boot With PEM-based TLS on-the-fly 2nd May 2021
  • Let’s Encrypt for Companies with KeyChest 3rd December 2019
  • KEYCHEST and HTTPS automation 20th November 2019
  • A story of building a service (KEYCHEST) 5th November 2019
  • Security of Sensor Networks (2008) 6th October 2019
  • Trusted Path for Smart Cards 6th October 2019
  • Privacy in Common Criteria 6th October 2019
  • Chrysalis Luna CA3 6th October 2019
  • Minerva Attack and Humble Beginnings 5th October 2019

Archives

Categories

Author

  • I and My Projects
  • Smart Atc|tects

KeyChest – encryption safely

KeyChest expiry monitoring

Click to learn more and start monitoring up to 500 of your web services for free.

Proudly powered by WordPress