Showing 57 - 64 of 122
Cryptography in Trusted Computing: an Introduction to Secure Hashing
Cryptography forms the foundation of many aspects of trusted computing. This article considers recent algorithms and cryptographic attacks, as well as some future directions for cryptography in deployed embedded systems.
04/24/2019
Optimizing Cyber Security and Trusted Computing on Today’s Connected Military and Commercial Aircraft
If not properly protected by taking trusted computing measures, every system on an aircraft can create a potential vulnerability. Paul Hart talks about optimizing cyber security on today’s connected military and commercial aircraft.
02/27/2019