Refine Results

(Filters Applied) Clear All
an illustration of a key lock protecting lines and nodes.
cyber security
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.
A zoomed-in view of a metal nozzle shooting a stream of orange onto a metal surface, and a nozzle shooting a stream of purple at the orange stream of material.
A novel method for manufacturing interconnects could open the door for 3D-printed microelectronic systems.
the letters "CEP"
cyber security
Developers can test cybersecurity solutions for government systems by using an integrated circuit modeled on Department of Defense designs.
Simulation of a flight test
artificial intelligence
For experiments with unmanned aerial vehicles, researchers use simulated geographies that avoid the risks of real-world flight tests.
an illustration of a circuit board
cyber security
We've developed an architecture and program plan for a moonshot to build a computer system that is secure to large classes of cyberattacks.
an illustration of a world map with network lines connecting countries
cyber security
A suite of technologies protects data both at rest and in transit by providing access to secure computation nodes distributed throughout a network.
Imagery from the GOES-16 Advanced Baseline Imager
environmental monitoring
The Laboratory's long-term collaboration with NOAA and NASA on environmental monitoring satellites has led to revolutionized weather imagery and products and improved detection for space and solar phenomena.
Small satellites are an attractive option for missions because of their low costs; however, they are vulnerable to cyberattacks. We provide a securable and usable architecture for keeping small satellites resilient to system compromise.
A secure reference architecture enables satellites to recover from cyberattacks and carry on their missions.
TKM enables seamless over-the-network key distribution to unmanned aerial vehicles (UAVs) and authorized terminals. At left, UAV video is accessible to authorized terminals. At right, an operator has modified access during the mission.
Cryptographic keys can now be created and securely distributed in real time during a mission.