Inteum Company
Links
seedsprint
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - cryptography+and+intrusion+detection
9
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Privacy-Preserving and Post-Quantum Secure Counter Denial of Service
Advantages: Post-quantum secure protection against DoS and DDoS attacks Privacy-preserving spectrum access with location and identity anonymity Efficient puzzle outsourcing via Private Spectrum Bastions (PSBs) Flexible deployment options: hash-based, lattice-based, and blockchain-integrated Compliance-ready with FCC standards and NIST-approved...
Published: 5/7/2025
|
Inventor(s):
Attila Yavuz
,
SALEH DARZI
Keywords(s):
Cryptography and Intrusion Detection
,
Telecommunication / Wireless Communication
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Electronics > Electronics Telecommunications
CYBERSECURITY: Reliability Of A Computer Network
Competitive Advantages This analytical model is developed using real data of the National Vulnerability Database, NVD. This analytical model is made up of data from Microsoft, Linux, and Apple computer operating systems that represents 99.34% of the market around the globe. This analytical model can identify the minimum number of steps, n, that...
Published: 7/12/2023
|
Inventor(s):
Chris Tsokos
,
Freeh Alenezi
Keywords(s):
Computers Software and Information Technology
,
Cryptography and Intrusion Detection
,
Cybersecurity
,
Diagnostic Tools for Network Vulnerability Evaluations
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
Deploying Neural-Trojan-Resistant Convolutional Neural Networks for Self-Driving Vehicles
Competitive Advantages This method can amplify Trojan’s malicious impact by making it more easily detectable so that system can provide rapid response and mitigation against the attacks This technology can prevent the spread of the attack to other connected systems and defend against attacks initiated through fake update requests The...
Published: 2/6/2024
|
Inventor(s):
Robert Karam
,
Brooks Olney
Keywords(s):
Autonomous Vehicle
,
Cryptography and Intrusion Detection
,
Cybersecurity
,
Hardware Based Security
,
Machine Learning
Category(s):
Technology Classifications > Data/AI > Cybersecurity - Data/AI
,
Technology Classifications > Engineering > Autonomous Vehicle
,
Technology Classifications > Engineering > Computer Engineering
,
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > C/S Cybersecurity
Wireless Efficient Privacy, Authentication and Resiliency Technologies for Forensic and Sensitive Data
Competitive Advantages Shows a near-optimal performance at the logger (e.g., resource limited IoT device). Achieves post-quantum security. FHE-based alternatives are ideal for single-server setting without a collusion-risk. Develop strategies to achieve scalable signature verification for constructions. Summary This invention creates a new...
Published: 1/12/2023
|
Inventor(s):
Attila Yavuz
Keywords(s):
Cryptography and Intrusion Detection
,
Cybersecurity
,
Diagnostic Tools for Network Vulnerability Evaluations
,
Telecommunication and Wireless Communication
Category(s):
Technology Classifications > Electronics > Electronics Telecommunications
,
Technology Classifications > Electronics
,
Technology Classifications > Computer Science > C/S Cybersecurity
A System And Method For Lightweight Post-Quantum Authentication For The Internet Of Things And Systems
Competitive Advantages Less memory is required for the signature and communication, as it does not require the signer to store and send the public key. Meets the NIST post-quantum cryptography standard with faster and memory-efficient processing on the signer’s side. The algorithm does not require any repetition of the signing algorithm....
Published: 7/12/2023
|
Inventor(s):
Rouzbeh Behnia
,
Attila Yavuz
Keywords(s):
Authentication and Biometric Systems
,
Cryptography and Intrusion Detection
,
Internet of Things / IoT
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science > C/S Sensors
,
Technology Classifications > Computer Science
,
Technology Classifications > Data/AI
,
Technology Classifications > Data/AI > Cybersecurity - Data/AI
,
Technology Classifications > Medical > Medical Devices
,
Technology Classifications > Medical > Medical Sensors
MAST Gas Loader Cell
Advantages Supports 1.9 mm, 1.3 mm, and 0.7 mm NMR rotors with one universal design Eliminates fragile and costly glass loader systems Minimizes gas waste with low-volume, airtight construction Portable and easy to duplicate or use in series for high-throughput Summary Solid-state NMR spectroscopy often requires loading rotors with isotopically...
Published: 5/12/2025
|
Inventor(s):
Jason Mast
,
Edwin Rivera
,
Perry Pellechia
Keywords(s):
Cryptography and Intrusion Detection
,
Cybersecurity
,
Material Science
,
Mechanical and Structural Engineering
Category(s):
Technology Classifications > Engineering > Mechanical Engineering
Hardware Supported Authentication and Signatures For Wireless, Distributed and Blockchain Systems
Competitive Advantages Energy-aware authentication protocol suitable for IoT devices and embedded devices Provable Security standards to the level of upcoming post-quantum security breaches in cryptosystems Scalable security architecture support for massive IoT applications Summary IoT devices play a central role in the distributed systems for...
Published: 8/16/2024
|
Inventor(s):
Attila Yavuz
,
Saif Nouma
Keywords(s):
Blockchain
,
Cryptography and Intrusion Detection
,
Cybersecurity
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > Network Systems
An SR Flip-Flop based Physical Unclonable Functions for Hardware Security
Competitive Advantages Promising solution to identify and authenticate Integrated Circuits Robust responses in terms of uniqueness, randomness, and uniformity Reduced bit-aliasing compared to other metastability-based PUFs Summary The novel PUF design proposed is unlike previous studies which typically require additional hardware...
Published: 7/17/2023
|
Inventor(s):
Srinivas Katkoori
,
Rohith Prasad Challa
,
Sheikh Ariful Islam
Keywords(s):
Cryptography and Intrusion Detection
,
Machine Learning
Category(s):
Technology Classifications > Computer Science
System/Methods for Compromise Resilient and Compact Authentication for Digital Forensics
Competitive Advantages Reduce total space of signature and public key storage High space efficiency for low state transition systems Useful for security monitoring applications Summary Our proposed technology addresses many of the concerns in state-of-the-art cryptographic techniques. The coding tools ensure breach-resilience while...
Published: 7/18/2023
|
Inventor(s):
Attila Yavuz
Keywords(s):
Computer Science
,
Cryptography and Intrusion Detection
,
Database Management
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science