Showing 73 - 80 of 122
Cryptography in Trusted Computing: an Introduction to Secure Hashing
Cryptography forms the foundation of many aspects of trusted computing. This article considers recent algorithms and cryptographic attacks, as well as some future directions for cryptography in deployed embedded systems.
04/24/2019
Curtiss-Wright and Green Hills Collaborate to Demo INTEGRITY-178 tuMP Safety-Certifiable RTOS on Arm VPX3-1703 SBC
Green Hills Software’s field-proven INTEGRITY-178 tuMP safety- and security-critical multi-core real-time operating system (RTOS) will be demonstrated for the first time running on the Curtiss-Wright VPX3-1703.
04/15/2019
Curtiss-Wright and General Dynamics Mission Systems Collaborate to Deliver AI-Based Solutions for EW Situational Awareness
A combination of Curtiss-Wright’s CHAMP-XD1 processor module and General Dynamics Mission Systems’ SignalEye software uses machine learning to detect threats in the RF spectrum.
04/02/2019