Cyber-Physical Systems 28/December/2023 What is cryptojacking? Understand the main points of the cryptojacking phenomenon, its origins, how it works and the consequences for individuals and organizations
Cyber-Physical Systems 22/September/2023 Study of vulnerabilities in MIFARE Classic cards Understand how RFID technology allows remote communication through electronic tags. Discover the details of MIFARE Classic cards, their structure, encryption and potential vulnerabilities
Cryptography 08/July/2020 Cryptography: Applications to ensure your privacy It guarantees that the confidentiality of the data can be assured, either in its storage or in its communication process
Cryptography 05/September/2019 A brief analysis of data compression security issues Many applications compress data before it is encrypted, which, in some cases, may compromise the confidentiality of the transmitted data
Cyber-Physical Systems 28/December/2023 What is cryptojacking? Understand the main points of the cryptojacking phenomenon, its origins, how it works and the consequences for individuals and organizations
Cyber-Physical Systems 22/September/2023 Study of vulnerabilities in MIFARE Classic cards Understand how RFID technology allows remote communication through electronic tags. Discover the details of MIFARE Classic cards, their structure, encryption and potential vulnerabilities
Cryptography 08/July/2020 Cryptography: Applications to ensure your privacy It guarantees that the confidentiality of the data can be assured, either in its storage or in its communication process
Cryptography 05/September/2019 A brief analysis of data compression security issues Many applications compress data before it is encrypted, which, in some cases, may compromise the confidentiality of the transmitted data