May 2013 No.25
Securing M2M with Post-quantum Public-key Cryptography
The article, “Securing M2M with Post-quantum Public-key Cryptography,” tells about the feasibility of using hardware-based public-key cryptography to provide general data security in M2M applications.
Two interesting events are briefed in this newsletter, a monthly meeting for all principal investigators of the center on the subject of “design thinking” and a field trip for the remote ecological monitoring system project. In the meeting, the concept of “design thinking” was introduced to help designers to think from users’ perspectives, and it motivated the cross-project synergy of the center. The trip was a chance for members of the center to understand how the technology is applied to help human’s life. In the next month, there will be an in-depth report on the project.
—From Editorial