Innovation Toronto Innovation Toronto

.

Highlights from the race between genius and stupidity . . .

  • About Us
    • Privacy Policy
  • List of Institutions
  • Institution Updates
  • 1MM to 3MM Visitors
    • 2MM to 3MM Visitors
    • 1MM to 2MM Visits
  • 100k to 1MM Visitors
    • 500k to 1MM Visitors
    • 300k to 500k Visitors
    • 200k to 300k Visits
    • 100k to 200k Visits
  • Up to 100k Visitors
    • 50k to 100k Visits
    • 25K to 50K Visits
    • 10k to 25k Visits
    • Under 10k Visits
Menu
  • About Us
    • Privacy Policy
  • List of Institutions
  • Institution Updates
  • 1MM to 3MM Visitors
    • 2MM to 3MM Visitors
    • 1MM to 2MM Visits
  • 100k to 1MM Visitors
    • 500k to 1MM Visitors
    • 300k to 500k Visitors
    • 200k to 300k Visits
    • 100k to 200k Visits
  • Up to 100k Visitors
    • 50k to 100k Visits
    • 25K to 50K Visits
    • 10k to 25k Visits
    • Under 10k Visits
loading...
The Latest
  • Achieving passive cooling inside naturally conditioned buildings in hot arid climates
  • Generating power from salt water at seawater-freshwater boundaries
  • Getting RNA for the first time from extinct species like the Tasmanian Tiger increases resurrection chances
  • Discovering the intention of a person using just brain wave data
  • Removing microplastics from water with fungus
  • DNA movable-type storage represents a major step forward in the field of data storage
  • Ultrasound can change brain functions for up to an hour
  • Two years’ worth of net global carbon emissions could be saved by upgrading iron and steel plants
  • An artificial multisensory integrated neuron to make AI even smarter
  • A potential solution that could have far-reaching implications for aging individuals
Home Encryption

Unbreakable? An encryption key approach to security that is unclonable and not reverse-engineerable

Unbreakable? An encryption key approach to security that is unclonable and not reverse-engineerable

Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavor... Read more

Share 0
Tweet
Share
Share

Encrypted information could use chemical compounds for passwords

Encrypted information could use chemical compounds for passwords

In the digital age, security of sensitive information is of utmost importance. Many data are encrypted before they enter the data highway. Mostly, these methods use a password for decryption... Read more

Share 0
Tweet
Share
Share

Fast and energy-saving encryption for the internet of things

Fast and energy-saving encryption for the internet of things

Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold. Most sensitive web transactions are protected by public-key cryptography,... Read more

Share 0
Tweet
Share
Share

WhatsApp and Apple encryption/access battles have huge global ramifications

WhatsApp and Apple encryption/access battles have huge global ramifications

While the Justice Department wages a public fight with Apple over access to a locked iPhone, government officials are privately debating how to resolve a prolonged standoff with another tech... Read more

Share 0
Tweet
Share
Share

Encryption for everyone

Encryption for everyone

In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutio... Read more

Share 0
Tweet
Share
Share

Secure computing for the ‘Everyman’

Secure computing for the ‘Everyman'

If implemented on a wide scale, quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer. The largest information technology agreemen... Read more

Share 0
Tweet
Share
Share

Scientists from CERN and MIT launch encrypted email service

Scientists from CERN and MIT launch encrypted email service

The privacy of the data that we put online has been a hot topic over the last year. In order to protect against unwanted snooping, a group of scientists has created a new secure email servic... Read more

Share 0
Tweet
Share
Share

“Unbreakable” security codes inspired by nature

“Unbreakable” security codes inspired by nature

A revolutionary new method of encrypting confidential information has been patented by scientists at Lancaster University. They have been inspired by their discoveries from human biology, wh... Read more

Share 0
Tweet
Share
Share

Assuring the Integrity of Voting Using Cryptography

Assuring the Integrity of Voting Using Cryptography

American voters have no way of knowing that our votes have been counted, or counted correctly. We go to the polls and we punch buttons on a screen or fill out paper ballots and put them in a... Read more

Share 0
Tweet
Share
Share

Why the Latest NSA Leak Is the Scariest of All

Why the Latest NSA Leak Is the Scariest of All

The National Security Agency programs revealed on Sept. 5 in three media reports were perhaps the most important revelations yet this summer, and have profound implications for everyone who... Read more

Share 0
Tweet
Share
Share

Data storage: Maintaining privacy on the cloud

Data storage: Maintaining privacy on the cloud

A data-sharing scheme utilizing an encryption manager shows the way towards low-cost, flexible and secure cloud storage services Wider adoption of cloud storage services by organizations has... Read more

Share 0
Tweet
Share
Share

What Happens At Def Con Stays With Us All

What Happens At Def Con Stays With Us All

There’s nothing like attendance at the annual Black Hat and Def Con security/hacker conferences to hike your paranoia into the red zone and keep it there forever. You come away with the sens... Read more

Share 0
Tweet
Share
Share

MIT researchers advance cloud security with end-to-end encyrption

MIT researchers advance cloud security with end-to-end encyrption

University researchers have taken an important step forward on cloud security by proving it’s possible for a server to process encrypted data and to send back a still-encrypted result.... Read more

Share 0
Tweet
Share
Share

Just how secure is quantum cryptography?

Just how secure is quantum cryptography?

Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and whose security dep... Read more

Share 0
Tweet
Share
Share

Steganography: Tinkering with Skype can allow people to send undetectable messages

Steganography: Tinkering with Skype can allow people to send undetectable messages

  Steganography: Speaking with silence SKYPE, a computer program that allows its users to have telephone-style conversations over the internet, is extremely popular. The service, owned... Read more

Share 0
Tweet
Share
Share
12

Most Visited Today

Most Visited This Week

Most Visited This Month

Most Visited This Year

Featured Today . . .

Achieving passive cooling inside naturally conditioned buildings in hot arid climates

Read More
on 27 September 2023

Generating power from salt water at seawater-freshwater boundaries

Read More
on 26 September 2023

Getting RNA for the first time from extinct species like the Tasmanian Tiger increases resurrection chances

Read More
on 25 September 2023

Discovering the intention of a person using just brain wave data

Read More
on 24 September 2023
The Latest University & Research Institutions Updated . . .

Princeton University

University of California Los Angeles (UCLA)

Texas A&M AgriLife Research

University of Illinois at Urbana Champaign (UIUC)

Tianjin University

University of Oxford

Peking University (PKU)

McGill University

Radboud University Nijmegen

University College London

University of Plymouth

Daegu Gyeongbuk Institute of Science and Technology (DGIST)

load more

Copyright 2023. Created by Innovation Toronto

Desktop Version Mobile Version