Tech Offer/Tech Need
Select

Technology Offers ( Infocomm - Security & Privacy )

An End-to-End Database Homomorphic Encryption Layer

Our technology is a database encryption solution that provides per-column encryption granularity and enables operations over encrypted columns...

Read More

Highly Secure 3-Factor Voice Authentication and Signature

This technology is a patented 3-factor in 1-touch Voice-Biometric solutions for Secure Authentications and Voice E-Signatures.It is an...

Read More

Network Security Protocol for Internet-of-Things (IoT) & Operational Technology (OT) Networks and Devices

Securing embedded IoT devices and networks are challenging due to the limited computing...

Read More

Hardware Security Preventing Side-channel Attack

We offer a side-channel-attack-resistance (SCA-resistance) technology to realize hardware secure crypto accelerators, e.g. Advanced Encryption Standard...

Read More

Simple & Secure Multi-Factor Authentication, Transaction Authorisation and Data Encryption

WE MAKE SENSITIVE DATA IRRELEVANT The current paradigm of developing and deploying applications (either in...

Read More

Multi-hop, Scalable and Dynamic Wireless Backhaul Technologies

PicoCELA Backhaul Engine (PBE) is an embedded system application that adds a multi-hop communication capability to a wireless platform...

Read More

GPS Security Tracking for Supply Chains

With the rise of new threats to cargo security, it is becoming increasingly important for companies to deploy electronic cargo tracking solution in their...

Read More

LDPC Codes for Storage System

Ahighly reliable storage system achieved by low spatial, computation...

Read More

Method to Prevent Information Leakage in Information Dispersal

Information Dispersal Algorithm (IDA) can be used to secure data stored in the cloud, as an alternative to encryption. By dispersing data...

Read More

Pages