[21-06-11] Improved security in open-source and open-specification hardware for connected device
The two tables below can be used when a European organization is looking for project partner, i.e. a specific type of organization, with a specific type of skill or interest.
The first table shows the skills and interests among a number of potential partners. When searching for a specific skill, start by looking at column 1. For each skill the potential partners are listed in the same row. The organization’s names are also links to their home pages.
The second table below shows all the organizations that are interested in this call, and also the types of organization (SME, startup, RTO etc.).
If you are interested in getting in touch with any of these organizations, please contact the node for more information at email@example.com.
|Type of expertise needed||Organisations|
|Restricted environment of IoT devices||T2 Data, Stöldskyddsföreningen, Swedavia, Göteborgs stad|
|Open source hardware||T2 Data|
|Formal verification of open hardware||Combitech, PICS/Högskolan i Skövde|
|Hardware-related security vulnerabilities||T2 Data|
|Patch management||Swedavia, Göteborgs stad|
|Security testing in restricted environments||Swedavia|
|Inventory management||PICS/Högskolan i Skövde|
|Formal security models||Swedavia|
|Verified and scalable cryptography||Swedavia|
|Authentication schemes||Expisoft, Sectyne, Swedavia|
|Verification methods for secure updates||Linköpings universitet, Expisoft, Sectyne, Swedavia|
|Multi-factor authentication hardware and software solutions||Expisoft, Sectyne|
|Connected devices life cycle||T2 Data, Swedavia, PICS/Högskolan i Skövde|
|HW-based secure execution environments||T2 Data, Linköpings universitet, Mobile Heights|