Breaking Secure Communication Systems: The History of Obsecurity

bulletStockholm, Sweden, 1 Jul 2004  What are the main flaws in the design of former and existing IT systems? The lectures gave both theoretical and very practical examples of how and why certain design decisions were taken in some of the well known areas, such as authentication systems, biometrics, secure hardware design, TV/DVD encryption and interception systems. The course focused not only on the technical aspects, but also some important legal and policy issues around technical decisions.i.e. data protection, cybercrime and intellectual property law.

Related topics:

bulletBreaking Secure Communication Systems: The History of Obsecurity