Keyword: Cryptography

Briefs: Electronics & Computers
The algorithm provides an extra layer of safety and security against hackers of electronic devices.
Briefs: Communications

Light is widely used for communications, carrying phone conversations and video signals through fiber optic cables around the world in pulses composed of many photons. Single...

Briefs: Photonics/Optics
Secure Optical Quantum Communications

NASA’s Glenn Research Center has developed a method of using entangled-photon pairs to produce highly secure mobile communications that require mere milliwatts of power. Conventional gas Argon-ion laser sources are too large, expensive, and power-intensive to use in portable applications. By contrast,...

Briefs: Software
Integrated Genomic and Proteomic Information Security Protocol

The evolving nature of the Internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain...

Briefs: Photonics/Optics
Optical Product and Document Security Method

An inexpensive security method for uniquely marking and identifying physical objects such as documents or labels has been developed. This technology uses the mixing of inks in numerous different ratios to print arbitrary marks on a given object. The ink mixture used in a printed mark produces a...

Briefs: Software
Shift: Self-Healing Independent File Transfer

In high-end computing environments, remote file transfers of very large data sets to and from computational resources are commonplace, as users typically are widely distributed across different organizations and must transfer in data to be processed, and transfer out results for further analysis....

Articles: Sensors/Data Acquisition

On October 21, 2016, the Internet saw a significant distributed denial of service (DDoS) attack, conducted via a botnet comprising many co-opted Internet-connected devices....

Briefs: Software
Prototype Genomics-Based Keyed-Hash Message Authentication Code Protocol

Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A DNA-inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash...

Briefs: Software

The motivation for this research is the fact that, for a variety of reasons, networks and their existing authentication and confidentiality infrastructure are becoming more...

Briefs: Electronics & Computers
An Offload NIC for NASA, NLR, and Grid Computing

This work addresses distributed data management and access — dynamically configurable high-speed access to data distributed and shared over wide-area high-speed network environments. An offload engine NIC (network interface card) is proposed that scales at n×10- Gbps increments through 100-Gbps...

Briefs: Information Technology

Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network...

Briefs: Information Technology
Hidden Statistics of Schrödinger Equation

Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schrödinger equation; i.e., to expose the transitional stochastic process as a “bridge” to the quantum world. The governing equations of hidden statistics would...

Application Briefs: Electronics & Computers

With high-profile data breaches making headlines regularly, organizations are carefully evaluating their options for protecting mobile data. For years, software full disk encryption, (FDE),...

Articles: Electronics & Computers

Embedded applications are increasingly going online. With the introduction of new embedded technologies that utilize a wide variety of communications options from Ethernet to Wi-Fi and ZigBee, there is...

Briefs: Software

Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn...

Briefs: Information Technology

Windowed revocation is a technique for the revocation of the digital certificates that provide assurance of the auth- enticity and integrity of public encryption keys and associated...

Briefs: Information Technology

An algorithm effects rapid initialization of a convolutional decoder. This algorithm can be applied "on the fly"; that is while the decoder is receiving a stream of convolutionally...

Webcasts

Upcoming Webinars: Automotive

The Art of EV Propulsion System Design

Upcoming Webinars: Automotive

Solutions for Automotive Interior Colors

Upcoming Webinars: Automotive

Latest Enhancements for ADAS Sensor Testing and Simulation

Upcoming Webinars: Automotive

Adhesives and the Future of Battery Designs

Upcoming Webinars: Manufacturing & Prototyping

Using High-Resolution X-ray Computed Tomography to Inspect...

Upcoming Webinars: Automotive

Digital Solutions to Design Vehicles for Noise and Vibration