Showing 81 - 88 of 135
Cryptography in Trusted Computing: an Introduction to Secure Hashing
Cryptography forms the foundation of many aspects of trusted computing. This article considers recent algorithms and cryptographic attacks, as well as some future directions for cryptography in deployed embedded systems.
04/24/2019
Curtiss-Wright and Green Hills Collaborate to Demo INTEGRITY-178 tuMP Safety-Certifiable RTOS on Arm VPX3-1703 SBC
Green Hills Software’s field-proven INTEGRITY-178 tuMP safety- and security-critical multi-core real-time operating system (RTOS) will be demonstrated for the first time running on the Curtiss-Wright VPX3-1703.
04/15/2019
Optimizing Cyber Security and Trusted Computing on Today’s Connected Military and Commercial Aircraft
If not properly protected by taking trusted computing measures, every system on an aircraft can create a potential vulnerability. Paul Hart talks about optimizing cyber security on today’s connected military and commercial aircraft.
02/27/2019