Learn More
The weakest link in software-based full disk encryption is the authentication procedure today. Since the master boot record must be present unencrypted in order to launch the decryption of remaining system parts, it can easily be manipulated and infiltrated by bootkits that perform keystroke logging; consequently password-based authentication schemes become(More)
Fuel cells are very promising for use in stationary and mobile electricity generation, for example traction and portable power. The paper describes the influence of switching power electronics on the efficiency and lifetime of fuel cells. The main topic is the dynamic operation of a fuel cell and the influence of the gas supply. Measurements were done to(More)
  • 1