Showing 41 - 48 of 77
Military & Aerospace Electronics

Trusted Computing and the Challenges of Cryptographic Algorithms in Quantum Computing

Quantum computing processes an algorithm by configuring quantum gates and initializing the qubits. Taking a measurement resolves the quantum states.

07/24/2019
Military & Aerospace Electronics

Trusted Computing Can Depend on Asymmetric Cryptography Algorithms to Assure the Integrity of Protected Data

Asymmetric algorithms enable systems designers to pair keys to facilitate more novel cryptographic operations than traditional symmetric algorithms.

06/26/2019
Curtiss-Wright Showcases Next-Generation FTI System Solutions at ETTC 2019

Curtiss-Wright Showcases Next-Generation FTI System Solutions at ETTC 2019

Curtiss-Wright will highlight its COTS FTI approach with live technology demonstrations, technical papers, and a broad range of Industry-leading system solutions on display.

06/11/2019
Military & Aerospace Electronics

Cryptography in Trusted Computing: an Introduction to Secure Hashing

Cryptography forms the foundation of many aspects of trusted computing. This article considers recent algorithms and cryptographic attacks, as well as some future directions for cryptography in deployed embedded systems.

04/24/2019
Curtiss-Wright Brings COTS-based Usage Monitoring and Predictive Maintenance Solutions to the Avionics Market

Curtiss-Wright Brings COTS-based Usage Monitoring and Predictive Maintenance Solutions to the Avionics Market

Curtiss-Wright Brings COTS-based Usage Monitoring and Predictive Maintenance Solutions to the Avionics Market

04/09/2019
Military & Aerospace Electronics

Trends in Trusted Computing and Network Security in Aerospace and Defense Embedded Computing Applications

In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible.

03/28/2019
Military & Aerospace Electronics

Optimizing Cyber Security and Trusted Computing on Today’s Connected Military and Commercial Aircraft

If not properly protected by taking trusted computing measures, every system on an aircraft can create a potential vulnerability. Paul Hart talks about optimizing cyber security on today’s connected military and commercial aircraft.

02/27/2019
The Cyber Edge

Architecting Cybersecurity Into Embedded Systems

Curtiss-Wright's anti-tamper and cyber resiliency expert offers insight to understanding interplay between cybersecurity techniques and embedded solutions.

01/01/2019