Search for European Projects

6 European Projects Found

Searched on 125080 European Projects

 FINISHED 
With a “mobile wallet” the mobile phone becomes a secure storage unit for credit cards, tickets, loyalty cards and keys. Mobile wallets available today require the use of a physical chip, a secure element that is costly to gain access to and has limited storage capacity. As opposed to a physical wallet that usually contains identity cards; no mobile wallet available today can provide the electroni ...
Read Project

 7

 FINISHED 
Protecting critical infrastructures providing communications, energy, or healthcare presents increasing ICT challenges as ICT itself has become vital to them. Internet-scale ICT infrastructures ("infrastructure clouds") promise scalable virtualised computing, network, and storage resources over the Internet. They provide scalability and cost-efficiency but pose significant new privacy and resilien ...
Read Project

 16

 FINISHED 

Foundations for Forgery-Resistant Security Hardware (UNIQUE)

Start date: Sep 1, 2009, End date: May 31, 2012,

The goal of the UNIQUE project is to tackle the problem of counterfeiting of and tampering with Integrated Circuits (ICs). Since ICs are at the core of modern and often critical electronics products and IT systems it is very important that their integrity can be guaranteed. We will develop an integrated approach to protect hardware systems against counterfeiting, cloning, reverse engineering, tamp ...
Read Project

 10

 FINISHED 
The goal of WSAN4CIP is to substantially advance the technology of Wireless Sensor and Actuator Networks (WSANs) beyond the current state of the art and to apply this technology to the Protection of Critical Infrastructures. In particular, the WSAN4CIP project will apply these advanced wireless and sensor network developments to the management of power generation and distribution infrastructure ma ...
Read Project

 12

 FINISHED 

Trusted Embedded Computing (TECOM)

Start date: Jan 1, 2008, End date: Mar 31, 2011,

Trusted Computing (TC) has become meanwhile an established technology for verification and implementation of integrity and security at personal computers. Similar requirements are also needed for embedded computing platforms which have alike trust and security problems due to the increasing complexity and therefore instability of Os and applications as well as connection to the Internet with its s ...
Read Project

 11

 FINISHED 

Computer Aided Cryptography Engineering (CACE)

Start date: Jan 1, 2008, End date: Dec 31, 2010,

Development of hardware devices and software products is facilitated by a design flow, and a set of tools (e.g., compilers and debuggers), which automate tasks normally performed by experienced, highly skilled developers. However, in both hardware and software examples the tools are generic since they seldom provide specific support for a particular domain. The goal of this project is to design, d ...
Read Project

 13