Showing 41 - 48 of 89
Military & Aerospace Electronics

Trusted Computing Can Depend on Asymmetric Cryptography Algorithms to Assure the Integrity of Protected Data

Asymmetric algorithms enable systems designers to pair keys to facilitate more novel cryptographic operations than traditional symmetric algorithms.

06/26/2019
Military Embedded Systems

Today’s Spacecraft and Satellite Requirements Giving COTS a Fresh Look

The fast growth of small satellites and their lower life cycle and launch costs has created a sizable market for low-cost electronic components that have radiation-resistant characteristics.

06/24/2019
Military & Aerospace Electronics

Cryptography in Trusted Computing: an Introduction to Secure Hashing

Cryptography forms the foundation of many aspects of trusted computing. This article considers recent algorithms and cryptographic attacks, as well as some future directions for cryptography in deployed embedded systems.

04/24/2019
Military & Aerospace Electronics

Trends in Trusted Computing and Network Security in Aerospace and Defense Embedded Computing Applications

In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible.

03/28/2019
Military & Aerospace Electronics

Optimizing Cyber Security and Trusted Computing on Today’s Connected Military and Commercial Aircraft

If not properly protected by taking trusted computing measures, every system on an aircraft can create a potential vulnerability. Paul Hart talks about optimizing cyber security on today’s connected military and commercial aircraft.

02/27/2019
Curtiss-Wright Preparing for Moon & Mars Missions

Curtiss-Wright Preparing for Moon & Mars Missions

Curtiss-Wright is working with NASA and aerospace leaders to return Americans to the Moon and send astronauts to Mars in the early 2030s

02/14/2019
The Cyber Edge

Architecting Cybersecurity Into Embedded Systems

Curtiss-Wright's anti-tamper and cyber resiliency expert offers insight to understanding interplay between cybersecurity techniques and embedded solutions.

01/01/2019
Military & Aerospace Electronics

A Guide to International Authorities for Global Trusted Computing Standards Certification

Trusted computing standards are evolving constantly within the United States, which can be confusing enough. International trusted computing standards can be even more difficult.

12/19/2018