🔍
Search Results - technology+classifications+%3e+computers%2c+electronics+%26+software+%3e+cybersecurity
3
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Task Manager
Unmet Need:As personal medical information continues to be digitized, it is increasingly essential to implement safeguards for the protection of such information.Technology Overview:Inventors at Johns Hopkins have developed a digital survey software platform for touch-screen data entry forms with tablet devices. The system is wirelessly synchronized...
Published: 3/14/2025
|
Inventor(s):
David Newman-Toker
Keywords(s):
Category(s):
Technology Classifications > Computers, Electronics & Software > Cybersecurity
,
Technology Classifications > Computers, Electronics & Software > Electronic Medical Records
,
Technology Classifications > Computers, Electronics & Software > Healthcare IT
Architecture for Network Attack Resilient Intrusion Tolerant SCADA
Unmet Need:Today’s SCADA (supervisory control and data acquisition)systems use fault-tolerance techniques to remain available even when parts of the system fail. The systems can be restored after a few hours of downtime during a non-critical time, a tolerance that is considered acceptable today.However, as malicious attacks become more prevalent, SCADA...
Published: 3/13/2025
|
Inventor(s):
Yair Amir
,
Thomas Tantillo
,
Amy Babay
Keywords(s):
Computer and Network Systems
,
Computer Software
,
Computing; Calculating; Counting
,
Database Management Software
,
Electrical Digital Data Processing
,
Physics
Category(s):
Technology Classifications > Computers, Electronics & Software > Healthcare IT
,
Technology Classifications > Computers, Electronics & Software
,
Technology Classifications > Computers, Electronics & Software > Cybersecurity
Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing
An efficient and practical method for dynamically maintaining an authenticated dictionary uses a skip list data structure and communicative hash functions to provide a dictionary database (201) that stores information objects so that any individual object can be authenticated as belonging or not belonging to the dictionary. The authentication consists...
Published: 3/13/2025
|
Inventor(s):
Roberto Tamassia
,
Michael Goodrich
Keywords(s):
Arrangements for Secret or Secure Communication
,
Computing; Calculating; Counting
,
Electric Communication Technique
,
Electrical Digital Data Processing
,
Electricity
,
Physics
,
Transmission of Digital Information
Category(s):
Technology Classifications > Computers, Electronics & Software > Cybersecurity
,
Technology Classifications > Computers, Electronics & Software > Healthcare IT
,
Technology Classifications > Industrial Tech > Energy, Infrastructure & Environment
,
Technology Classifications > Computers, Electronics & Software
,
Technology Classifications > Industrial Tech
JHTV Home
|
Search
|
Login/Subscribe
2017 - 2022 © Johns Hopkins Technology Ventures. All Rights Reserved. Powered by
Inteum