Mid last year I gave a talk together with Christopher Seidl about how to use the Keil uVision 5 to implement secure device management based on the Arm Pelion platform, which uses the LwM2M protocol under the hood. Christopher did the hands-on session.
The registration for the 4th OAuth Security Workshop (March 20-22, Stuttgart) is now open. As usual, the workshop will feature interesting talks and discussions around OAuth, OpenID Connect, and related standards and technologies. This time, we also aim to offer tutorials on the morning of the first day and an
OAuth 2.0 has been around for several years now and I have always been interested to reach out to the wider industry for more feedback about the standardization work. This interest for feedback has led to several workshops and the 4th OAuth Security Workshop (OSW 2019) will take place in
With the release of the SecureMark-TLS benchmark by the Embedded Microprocessor Benchmark Consortium (EEMBC) last year, it is now possible to gather information about the performance and power consumption of typically-used cryptographic functions on M-class microcontrollers (MCUs). This benchmark was developed in response to developers’ need to answer questions like “How long
I attended Mbed Connect 2018 in San Jose and talked about the role of standards for IoT security. My co-worker Jan Jongboom provided a nice summary in this blog post “It’s a wrap: Mbed Connect US 2018 is done”. I stayed there for the entire event and was surprised about
I will give two talks at Arm TechCon 2018, see https://www.armtechcon.com. Arm TechCon brings together thousands of engineers, architects, developers and product designer of leading companies in the embedded industry. First, I will focus on the new TLS and DTLS 1.3 specifications and the implementation I have been working on.
Dave Thaler, Mary Barnes, and I had the honor to talk to the participants of the IETF#92 meeting in Dallas/Texas about the recently published Smart Object Architecture document, see RFC 7452. The presentation was given during the technical plenary of the Internet Architecture Board (IAB). A recording of the talk was
[UPDATED: 14. January 2015] Early 2014 we organized a couple of webinars to hear about technologies that allowed to provide authentication of Internet of Things devices and to control access to resources. We learned more about OAuth, Kerberos, and the PKI/certificate model and all talks have been recorded and can be found
At the last IETF meeting early March in London I had the pleasure to co-chair the Authentication and Authorization for Constrained Environments (ace) BOF with Kepeng. The picture of the flyer we distributed during the meeting should give you a rough idea what the topic is about. (We are also
I got invited to speak at the Tivit Future Internet pre-conference, which took place end of May in Helsinki, Finland. I agreed to give a presentation and the agenda for the event can be found at http://www.futureinternet.fi/seminar_2012.htm. Of course I agreed before I decided what I would actually talk about.