Search
User-centric PRivacy & Security in the IoT – UPRISE-IoT
UPRISE-IoT's goal is to make users gain control over data generated and collected by the IoT devices surrounding her. Since the IoT will be omnipresent in our day-to-day, it can become very privacy-intrusive. Its deployment might be stopped or slowed-down if privacy is not consider from the beginnin
Security and PrIvacy foR the Internet of Things – SPIRIT
As the adoption of digital technologies expands, it becomes vital to build trust and confidence in the integrity of such technology. The SPIRIT project will investigate the Proof-of Concept of employing novel secure and privacy-ensuring techniques in services set-up in the Internet of Things (IoT) e
User empowerment for Security and prIvacy in Internet of Things – USEIT
To be trustworthy, any system needs to protect the data it transmits and processes. Realizing such protection is particularly challenging for Internet of Things because of the devices’ limitations in terms of resources, user interfaces, connectivity, and bandwidth on the one hand, and because of the
SecUre aCCESSibility for the internet of things – SUCCESS
The IoT has a great potential to provide novel services to humans in critical areas for society. This innovation however requires updating our understanding of the risks associated with the new technology so that we can deploy it with confidence and society can trust it. Amongst the biggest prob
TERAhertz high power LINKS using photonic devices, tube amplifiers and Smart antennas – TERALINKS
The TERALINKS project is dedicated to the demonstration of a real-time THz communication system, with the 200-300 GHz bandwidth, in an operational environment. The TERALINKS consortium aims to integrate three key enabling technologies and demonstrate the state of the art system with industrial re
IDentification for the Internet Of Things – ID_IOT
The IoT will contain a huge number of devices and objects that have very low or nonexistent processing and communication resources, coupled to a small number of high-power devices. The weakest devices, which are most ubiquitous, will not be able to authenticate themselves using cryptographic methods