Projects

Refine Results

(Filters Applied) Clear All
an illustration of a world map with network lines connecting countries
cyber security
A suite of technologies protects data both at rest and in transit by providing access to secure computation nodes distributed throughout a network.
TKM enables seamless over-the-network key distribution to unmanned aerial vehicles (UAVs) and authorized terminals. At left, UAV video is accessible to authorized terminals. At right, an operator has modified access during the mission.
cryptography
Cryptographic keys can now be created and securely distributed in real time during a mission.

Showing Results

1-2 of 2