During the the twentieth century, a race for speed in telecommunication technologies has driven research and technical evolution. But recently, a new crucial question appeared: how to ensure the security of data flows? Is it possible to (...) | ↦ Read more