New Search

If you are not happy with the results below please do another search

94 search results for: digital security

11

Passwords: security, vulnerability and constraints

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] What is a password? A password is a secret linked to an identity. It associates two elements, what we own (a bank card, badge, telephone, fingerprint) and what we know (password or code). Passwords are very widely used, for computers, telephones, banking. […]

12

Trust and identity in the digital world

This article is part of our series on trust, published on the occasion of the release of the Fondation Mines-Télécom booklet: “The new balances of trust: between algorithms and social contract.” [divider style=”normal” top=”20″ bottom=”20″] What does “trust” mean today? Technology is redefining the concept of trust by placing the issue of identity transparency in the […]

13

Cybersecurity: new challenges to face up to

Computer hacking and sensitive data theft is increasing. Companies are now highly connected and must adapt their security policy to strengthen the protection of their information assets. Hervé Debar, a researcher at Télécom SudParis and expert in cybersecurity, studies the different types of cyber attacks in order to optimize their detection.   The era when […]

14

The European digital union

This issue of Réalités Industrielles is devoted to several subjects central to European Commission’s strategy, such as the data economy, the economic and social functions of online platforms, and cybersecurity.   To build a Digital Single Market is to construct Europe’s future. Given the many crises facing Europe, it is more important than ever to […]

16

The Cybersecurity of Critical Infrastructures Chair welcomes new partner Société Générale

The Institut Mines-Télécom Cybersecurity Chair, launched last year on January 25 as part of the dynamic created by the Center of Cyber Excellence, is aimed at contributing to the international development of research activities and training opportunities in an area that has become a national priority: the cybersecurity of critical infrastructures (energy networks, industrial processes, […]

17

Taking on quantum computers

What if quantum computers, with their high computing power, were already available: what would happen? How would quantum computing transform communications and the way they are encrypted? Romain Alléaume, a researcher at Télécom Paris, talks to us about his research for the future of cryptography.   A hypothetical quantum computer with its high computing power […]

18

A third ERC grant in 3 years at EURECOM

Getting a grant from the European Research Council is not an easy task but this is what Davide Balzarotti, Professor in the Security Department, has just accomplished. He is the third EURECOM professor to obtain an ERC grant in the past 3 years.   Davide, you just got an ERC Consolidator grant, one of the […]

19

Octave: trustworthy and robust voice biometric authentication

Surely, voice biometric authentication would be an easier alternative to the large amount of passwords that we use daily. One of the barriers to exploitation involves robustness to spoofing and challenging acoustic scenarios. In order to improve the reliability of voice biometric authentication systems, Nicholas Evans and his team at Eurecom are involved since June […]