A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). Such experiments demonstrate the secure satellite-to-ground exchange of cryptographic keys with ?kHz rate during the passage of the satellite Micius over a ground station. Using Micius as a trusted relay, a secret key is created between China and Europe at locations separated up to 7,600 km on the Earth.
'The beauty of this research is that someone using only a laptop and an object that flickers can detect if someone is using a drone to spy on them,' says Ben Nassi, a Ph.D. student in the BGU Department of Software and Information Systems Engineering and a researcher at the BGU Cyber Security Research Center (CSRC). 'While it has been possible to detect a drone, now someone can also tell if it is recording a video of your location or something else.'
Data travels through thousands of miles of fiber optic cables underneath the world's oceans--via pulses of light. And according to experts, the data in these cables is at great risk of being intercepted. However, a newly designed frequency comb--recently developed by researchers at the USC Viterbi School of Engineering might be an effective tool for data encryption.
A method of securely communicating between multiple quantum devices has been developed by a UCL-led team of scientists, bringing forward the reality of a large-scale, un- hackable quantum network.
Blockchain technology can help improve old models of data management and bring benefits to learners and educational institutions in the EU -- if policymakers are well prepared to embrace the change.
Data from the physical sensors in a smart phone could be used by hackers to guess the security PIN and unlock it, says NTU Singapore researchers.
New machine learning method developed by researchers at the University of Helsinki, Aalto University and Waseda University of Tokyo can use for example data on cell phones while guaranteeing data subject privacy.
Researchers at Universidad Carlos III de Madrid (UC3M) and the Consejo Superior de Investigaciones Científicas-CSIC (Spanish National Research Council) are developing a tool that enables cell phones to be analyzed in order to determine if they could undergo a cyber-attack to obtain encryption keys through their electromagnetic emanations.
A University at Buffalo-led team of researchers has discovered how to identify smartphones by examining just one photo taken by the device. The advancement opens the possibility of using smartphones -- instead of body parts -- as a form of identification to deter cybercrime.
An international team of researchers, affiliated with South Korea's Ulsan National Institute of Science and Technology (UNIST) has presented a core technology for quantum photonic devices used in quantum information processing. Their work has been published in the November issue of the prestigious journal, Nano Letters.