More Fields

Filters

Profiles which have:

Recent Changes

Profiles with recent changes to:
Sign up to Download

31-60 of 1,410 results

  • otvandaalen.nl
  • 1
  • 1
My law firm Root Legal provides advice and litigation on privacy, cybersecurity and AI... I also work at the Institute for Information Law of the University of Amsterdam... I have written a PhD on information security, encryption, quantum computing..

Relevance: 25.549019
  • scrt.network
Hold and use your tokens in privacy. With Secret Bridges and the SNIP-20 standard you can bridge over and make any token privacy-preserving. Become one of the first to build with Secret AI, our brand-new AI infrastructure layer. Enabling large scale..

Relevance: 25.543486
  • www.bmu-sec.com
We operate the Innovation Turing Machine - an effective invention engine. We measure the difficulty to crack your security using the Intractability Turing Machine... We are working on a faster computing with minimum power, which is a growing need in..

Relevance: 25.405344
  • www.securityarchitecture.com
  • 2
  • 3
SecurityArchitecture.com is the collective work of a small team of security experts whose work includes providing security services and training. The site was founded and is managed by Stephen Gantz, who works as a security consultant and university..

Relevance: 25.379433
  • jacopopanerati.github.io
  • 1
Jacopo's doctoral research focused on adaptive computing system for aerospace. Today's computer systems are growing more and more complex at an unmanageable pace, and space, in particular, represents a challenging environment for them. Self-adaptive..

Relevance: 25.356056
  • www.linuxbe.com
  • 2
  • 1
  • 1
Our goal is to help organizations specialize, collaborate, and succeed with commercial Linux solutions. Whether you're looking to improve your technology infrastructure, enhance your security and privacy, or support your company's goals, Linux..

Relevance: 25.03524
  • xel.org
XEL is the first decentralised super computing platform, adapted to execute any computational task on demand... XEL offers a versatile and flexible system by enabling self programmable tasks instead of hardcoded use cases. This is achieved thanks to..

Relevance: 25.002474
  • labs.engineering.asu.edu
  • 1
  • 1
Led by Dr. Yanchao Zhang, CNSG conducts cutting-edge fundamental and experimental research on security and privacy issues in computer and networked systems. Our current focus areas encompass a diverse array of topics, including FutureG wireless..

Relevance: 24.957066
  • www.dipsec.eu
  • 1
  • 1
DIPSec is working with small and large businesses in all business sectors within and outside Europe. Our team are experts who hold multiple professional certifications in governance, risk, compliance, security, privacy and business... DIPSec is..

Relevance: 24.806616
  • solutionsbridge.co.ke
Solutions Bridge International (SBI) provides a platform for like-minded professionals to provide modern and innovative open source solutions to social problems using new and emerging technologies in computer science... Our main focus is on research..

Relevance: 24.702988
  • tf-encrypted.io
Under the hood, TF Encrypted integrates state-of-the-art cryptography like secure multi-party computation and homomorphic encryption. Take advantage of prebuilt highly optimized protocols or build and test your own using our pluggable architecture.....

Relevance: 24.648197
  • www.wiser.arizona.edu
  • 2
  • 4
The Wireless Network and Cyber Security Research (WiSeR) lab at the University of Arizona is directed by Prof. Ming Li. We conduct research in the general areas of Wireless and Cyber Security, with the current emphases on security, privacy and..

Relevance: 24.601109
  • www.dataprobity.com
  • 1
DataProbity is a recognized standards leader, actively participating in the development of privacy and security standards in new technology areas through NIST, Cloud Security Alliance, OASIS, among others. We have co-developed standards for wireless..

Relevance: 24.568817
  • icaangroup.com
  • 10
  • 11
Our research is tailored towards solving cutting-edge industrial and research problems related to Security, Service, Network and Computation Optimization and Management in Emerging Technologies including Internet of Things, Cloud/Fog/Edge Computing,..

Relevance: 24.558214
  • chariotproject.eu
Our mission is simple but impactful: to establish devices and hardware as the root of trust, ensuring uncompromising security, data integrity, and compliance in industrial IoT. Whether you're a business navigating the complexities of IoT..

Relevance: 24.416054
  • www.synergylabs.org
  • 31
  • 2
  • 36
Our primary research interests are in the broad area of systems - especially at the intersection of hardware and software systems. In recent years, we have worked on topics related to Energy Efficient Computing in Buildings and the Internet of Things..

Relevance: 24.32471
  • www.silasreinagel.com
  • 1
As a programmer, I write mostly in C# and Java, and specialize in Microservice Architecture, Distributed Computing, Messaging Patterns, Object-Oriented Design, and Automated Testing. I have been creating software solutions for over 20 years, and have..

Relevance: 24.283772
  • www.edgeless.systems
  • 1
  • 1
Edgeless Systems is a cybersecurity company that makes the public cloud the safest place for sensitive data. Building world-leading open-source solutions for confidential computing, we take data security for cloud and AI applications to an..

Relevance: 24.235586
  • www.bitmintutility.com
  • 1
Advanced cyber security products based on quantum-mechanical grade randomness, making Cyberspace more vigilance and safer, enhancing citizen's welfare. Working on faster computing with minimum power, fulfilling growing needs in all IT, security and..

Relevance: 24.227507
  • voxelsensors.com
  • 3
  • 1
By sending your personal data in this form, you acknowledge that VoxelSensors SRL/BV will process your personal data in order to answer your queries, in compliance with and as further specified in the Privacy Policy... Spatial and Empathic..

Relevance: 24.195953
  • mics.ucsd.edu
  • 2
  • 2
  • 6
MICS brings together experts across the diverse fields of data analytics, learning, system design, computing, and device technologies. Our collective goal is to leverage state-of-the-art AI technologies for revolutionizing the design and optimization..

Relevance: 24.066792
  • yuanyuanfeng.com
I'm an Assistant Professor in the Department of Computer Science at the University of Vermont (UVM). Before joining UVM, I was a postdoctoral researcher in the School of Computer Science at Carnegie Mellon University (CMU) and earned my PhD degree..

Relevance: 23.853569
  • arvefoyen.com
  • 1
  • 1
Attorney at Law - Specialist in Information Technology contracts including Cloud computing and IPR protection. His work experience include drafting and negotiating contracts for TV production, Broadcasting, Internet and mobile distribution and..

Relevance: 23.674904
  • www.archonicstechnologies.com
  • 1
Archonics is a leading telecom consulting & business process services company. We connect the power of rational emerging technologies, automation and analytics to help our clients adapt to the new technological era and make them successful.....

Relevance: 23.627352
  • sibrtech.com
  • 1
An infrastructure-based application leveraging edge computing and custom-built machine learning models to give oncoming vehicles advanced "sight" of an intersection or road segment. With this advanced "sight," autonomous and semi-autonomous systems..

Relevance: 23.549715
  • www.enockmbewe.com
The current implementation of Internet Security services leaves users, especially those with limited computing skills, out of the security decision making process. This is because the security configuration parameters are either hidden from the user..

Relevance: 23.54917
  • supervene.com
Supervene is dedicated to advancing technology with an independent focus, free from outside pressures, and centered on meaningful innovation that benefits everyone...  At Supervene LLC, we create technology solutions to solve complex challenges in..

Relevance: 23.463173
  • www.raecomputing.com
  • 1
  • 1
RAE Computing is at the forefront of IT development and communication technologies. Our sharp focus on customer service makes us one of the UK's most professional IT support companies... RAE Computing was established in 2003 and has built up an..

Relevance: 23.424845
  • www.silencelaboratories.com
  • 3
  • 2
  • 25
Our products are adaptive to quorums-{2,2} and {t, n}, elliptic curves, access policy designs, across different form factors of computing nodes (phone, cloud, smart devices, confidential compute enclaves) and more!... Our Products allow you to..

Relevance: 23.42108
  • hightowersvc.com
  • 2
  • 1
Hightower consulting LLC is continuously aiming to be on the bleeding edge of Cyber Security, Data Protection & Privacy, and the preferred partner for the selection and integration of Cyber Security, Data Protection & Privacy Solutions, and we can..

Relevance: 23.418211