Cryptographic “tag of everything” could protect the supply chain
Tiny, battery-free ID chip can authenticate nearly any product to help combat losses to counterfeiting.
Tiny, battery-free ID chip can authenticate nearly any product to help combat losses to counterfeiting.
Mobile voting application could allow hackers to alter individual votes and may pose privacy issues for users.
Routing scheme boosts efficiency in networks that help speed up blockchain transactions.
Two staff members from Lincoln Laboratory and a professor in the School of Engineering are recognized for their influential research.
Modeling web traffic could aid cybersecurity, computing infrastructure design, Internet policy, and more.
Model from the Computer Science and Artificial Intelligence Laboratory identifies “serial hijackers” of internet IP addresses.
Study offers models for preserving the privacy of citizens while using their data to improve government services.
Professor Adam Chlipala builds tools to help programmers more quickly generate optimized, secure code.
Longtime MIT professor developed early “time-sharing” operating systems and is widely credited as the creator of the world’s first computer password.
System automatically writes optimized algorithms to encrypt data in Google Chrome browsers and web applications.
Lincoln Laboratory's technique to protect commodity software from cyberattacks has transitioned to industry and will soon be available as part of a security suite.
Researchers use a new, holistic methodology to address cyber vulnerabilities in today’s energy systems.
Researchers design a negotiation strategy to help cities and organizations minimize losses when their data are held hostage.
Efficient chip enables low-power devices to run today’s toughest quantum encryption schemes.
Lincoln Laboratory researchers have developed a technique to compress hours of internet traffic into a bundle that can be analyzed for suspicious behavior.