Latest Stories

Articles
Information Technology

The Next Generation of Mission-Critical Communications Infrastructure is Here

The critical role of spectrum superiority in the success of battlefield campaigns is evidenced by the enormous investments being made in electronic warfare (EW)...

Briefs
Photonics/Optics

Optical De-Multiplexing Method for QKD Encryption

Classical laser communication gimbals are coupled to 105um multimodal receiving fibers for the high-power transmission of data, fine pointing, and tracking. These fibers cannot be used in...

Briefs
Photonics/Optics

High-Speed Communication Vouchsafed by the Laws of Quantum Physics

Security in encrypted communication is a top priority because of our highly connected and mobile society’s increasing reliance on the internet. Engineers at Department of Electrical Engineering and Computer Science and the Research Laboratory of Electronics, MIT, have developed...

Application Briefs
Software

Security IP Module

Curtiss-Wright Defense Solutions Ashburn, VA
703-779-7800
www.curtisswright.com

Curtiss-Wright Defense Solutions, a leading proponent of modular open systems approach (MOSA) based solutions, announced that it...

Articles
Data Acquisition

Provisioning Smart Sensors for the IoT

The biggest challenge in the provisioning process: ensuring that a device and the connection to the network and server are secure.

Briefs
Electronics & Computers

FPGAs and HPC

A study determined the value of Field Programmable Gate Arrays (FPGAs) for high-performance computing (HPC) applications.

Features
IoMT

Is Healthcare Ready to Pick Up the Pace in Cybersecurity?

Healthcare organizations face very difficult choices in balancing patient protection with financial demands.

Technology Leaders
Connectivity

Innovative IoT Sensor Applications Pave the Way to the Future

Sensors play a pivotal role in solving critical business challenges.

Articles
Electronics & Computers

Information Warfare: Staying Protected at the Edge

Securing data shared and stored on the battlefield will require hardware with built-in cybersecurity features

Briefs
Electronics & Computers

Algorithm Defends Against Side-Channel Attacks on Hardware

The algorithm provides an extra layer of safety and security against hackers of electronic devices.

Articles
AR/AI

Development of a Secure Private Neural Network Capability

Learn how to fully implement a Secure Private Neural Network.

News
Communications

Dolphin Technologies Introduces Cryptocurrency Aimed at Reducing Mobile Phone-Related Accidents

Austrian telematics company, Dolphin Technologies GmbH, has created a new cryptocurrency that could lead to less mobile phone-related...

News
Internet of Things

MOBI Rolls out the First Blockchain-Enabled Vehicle Identity (VID) Mobility Standard

The Mobility Open Blockchain Initiative (MOBI) – a global nonprofit working to create standards in blockchain, distributed ledgers, and related...

Briefs
Sensors/Data Acquisition

Single-Photon Detector for Potential Encryption and Sensing

Light is widely used for communications, carrying phone conversations and video signals through fiber optic cables around the world in pulses composed of many photons. Single...

Articles
Manufacturing & Prototyping

5G Cellular May Be Transformational for Automakers, Suppliers

Connected vehicles are going mainstream, autonomous vehicles are poised to emerge—and cellular communications appears to be a central infrastructural base for both. The...

Briefs
Software

Integrated Genomic and Proteomic Information Security Protocol

The evolving nature of the Internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain...

Briefs
Photonics/Optics

Secure Optical Quantum Communications

NASA’s Glenn Research Center has developed a method of using entangled-photon pairs to produce highly secure mobile communications that require mere milliwatts of power. Conventional gas Argon-ion laser sources are too large, expensive, and power-intensive to use in portable applications. By contrast,...

Briefs
Photonics/Optics

Optical Product and Document Security Method

An inexpensive security method for uniquely marking and identifying physical objects such as documents or labels has been developed. This technology uses the mixing of inks in numerous different ratios to print arbitrary marks on a given object. The ink mixture used in a printed mark produces a...

Briefs
Software

Shift: Self-Healing Independent File Transfer

In high-end computing environments, remote file transfers of very large data sets to and from computational resources are commonplace, as users typically are widely distributed across different organizations and must transfer in data to be processed, and transfer out results for further analysis....

Articles
Sensors/Data Acquisition

CERTIFICATES AND SIGNATURES: How to Ensure Authentication in the IoT

On October 21, 2016, the Internet saw a significant distributed denial of service (DDoS) attack, conducted via a botnet comprising many co-opted Internet-connected devices....

Articles
Defense

DPA Countermeasures — Theory vs. Practice

The Threat

In today’s interconnected world, the information that we generate, store, transmit, and receive has become a valuable commodity. We have increasingly turned to cryptography as a tool...

Articles
Test & Measurement

A Hardware-Centric Approach to Countering Side-Channel Threats

From laptops and mobile devices to cars and airplanes, we are seeing near-daily threats to the systems and devices we use. Systems being used and deployed in the aerospace and...

Briefs
Software

Prototype Genomics-Based Keyed-Hash Message Authentication Code Protocol

Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A DNA-inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash...

Briefs
Information Technology

Integrated Genomic and Proteomic Information Security Protocol

The motivation for this research is the fact that, for a variety of reasons, networks and their existing authentication and confidentiality infrastructure are becoming more...

Articles
Aerospace

Next-Generation Mobile Tactical Communications

After many years of development and well-publicized budget overruns, the DoD’s Joint Tactical Radio System program (since reorganized and renamed) has recently given birth to a set of handheld...

Briefs
Electronics & Computers

An Offload NIC for NASA, NLR, and Grid Computing

This work addresses distributed data management and access — dynamically configurable high-speed access to data distributed and shared over wide-area high-speed network environments. An offload engine NIC (network interface card) is proposed that scales at n×10- Gbps increments through 100-Gbps...

Briefs
Information Technology

A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network...

Briefs
Information Technology

Hidden Statistics of Schrödinger Equation

Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schrödinger equation; i.e., to expose the transitional stochastic process as a “bridge” to the quantum world. The governing equations of hidden statistics would...

Application Briefs
Electronics & Computers

Managing a Network of Self-Encrypting Hard Drives

With high-profile data breaches making headlines regularly, organizations are carefully evaluating their options for protecting mobile data. For years, software full disk encryption, (FDE),...