From "Useless Math," Powerful Security
Channel:
Subscribers:
10,900
Published on ● Video Link: https://www.youtube.com/watch?v=k4t0Zw8HAsY
Sensor networks are made up of devices with the tiny processors and meager power supplies, which limit their ability to run the strong cryptosystems that are used to protect data in more robust computing environments. William Martin, professor of mathematical sciences at Worcester Polytechnic Institute (WPI), has drawn on mathematical systems that were once thought to have no practical use to help make public key cryptography run effectively on such devices.
Other Videos By WPI
2010-02-11 | Research at WPI |
2010-02-11 | Taking Ultrasound's Benefits to the Patient |
2010-02-11 | Smart Sensors That Head Off Heart Attacks |
2010-02-11 | Exploring the Human Element in Fire Safety |
2010-02-11 | The Complexities of Multiphase Flows |
2010-02-11 | Intelligent Tutoring Systems That Teach and Assess |
2010-02-11 | Finding Patterns That Can Improve Sleep |
2010-02-11 | Making Sense of Data Streams On The Fly |
2010-02-11 | Security Gets Physical to Thwart Thieves |
2010-02-11 | Securing Data in the Air and in the Cloud |
2010-02-11 | From "Useless Math," Powerful Security |
2010-02-11 | Studying Arterial Blood Flow to Save Lives |
2010-02-11 | Enhancing Tissue Regeneration |
2010-02-11 | Engineering New Blood Vessels |
2010-02-11 | Repairing Damaged Hearts |
2010-02-11 | How a Building Can Catalyze Partnerships |
2010-02-11 | Can E-Medical Records Fix Health Care? |
2010-02-11 | Turning Energy Into Power More Efficiently |
2010-02-11 | Making Clean Power with Wind Turbines |
2010-02-11 | Engineering Sturdier Gears for Windmills |
2010-02-11 | Supercharging Yeast to Make More Ethanol |
Tags:
martin
video
2b
open