| 12079374 |
Secure software compilation and software verification |
Dale Bowie, Narayana Aditya Madineni |
2024-09-03 |
| 11985239 |
Forward secrecy in transport layer security (TLS) using ephemeral keys |
Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean, Stephen J. McKenzie +2 more |
2024-05-14 |
| 11892938 |
Correlation and root cause analysis of trace data using an unsupervised autoencoder |
Narayana Aditya Madineni, Michael W. Gray, Leigh S. McLean |
2024-02-06 |
| 11818208 |
Adaptive data protocol for IoT devices |
Jayachandu Bandlamudi, Narayana Aditya Madineni, Xinlin Wang |
2023-11-14 |
| 11757659 |
Post-quantum certificate binding |
Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Peter T. Waltenberg |
2023-09-12 |
| 11720471 |
Monitoring stack memory usage to optimize programs |
Narayana Aditya Madineni, Michael W. Gray, Luvita Burgess |
2023-08-08 |
| 11716206 |
Certificate based security using post quantum cryptography |
Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Peter T. Waltenberg |
2023-08-01 |
| 11683182 |
Message embedment in random values |
Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Stephen J. McKenzie, Michael James Thomas |
2023-06-20 |
| 11632246 |
Hybrid key derivation to secure data |
Michael W. Gray, Simon D. McMahon, Narayana Aditya Madineni, Peter T. Waltenberg |
2023-04-18 |
| 11570153 |
Virtual machine perfect forward secrecy |
Narayana Aditya Madineni, Michael W. Gray, Leigh S. McLean |
2023-01-31 |
| 11550896 |
Password strength |
Leigh S. McLean, Narayana Aditya Madineni, Michael W. Gray |
2023-01-10 |
| 11463242 |
Padding oracle elimination in RSA encryption |
Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean |
2022-10-04 |
| 11374975 |
TLS integration of post quantum cryptographic algorithms |
Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean, Peter T. Waltenberg |
2022-06-28 |
| 11368316 |
Applying PKI (public key infrastructure) to power of attorney documents |
Narayana Aditya Madineni |
2022-06-21 |
| 11271968 |
Zero round trip time transmission for anticipatory request messages |
Narayana Aditya Madineni, Michael W. Gray, Luvita Burgess |
2022-03-08 |
| 11206135 |
Forward secrecy in Transport Layer Security (TLS) using ephemeral keys |
Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean, Stephen J. McKenzie +2 more |
2021-12-21 |
| 11153299 |
Secure data transport using trusted identities |
Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean, Luvita Burgess +2 more |
2021-10-19 |
| 11138608 |
Authorizing multiparty blockchain transactions via one-time passwords |
— |
2021-10-05 |
| 10812267 |
Secure password lock and recovery |
Simon D. McMahon, Narayana Aditya Madineni, Michael W. Gray, Leigh S. McLean, Luvita Burgess +2 more |
2020-10-20 |
| 9449197 |
Pooling entropy to facilitate mobile device-based true random number generation |
Leigh S. McLean, Peter Theodore Waltenberg |
2016-09-20 |
| 8949814 |
Providing a software upgrade risk map for a deployed customer system |
Christopher J. Hockings, Trevor S. Norvill, Richard A. Speter |
2015-02-03 |