Blogs

Search

Latest Blogs

The Blockchain - A Short Briefing Note

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

1.The Blockchain is a register or database containing statements (e.g. ownership, rights or a smart contract) provided by the participants to provide a complete history. The history cannot be modified or deleted you can only add new statements

The Security of the Blockchain at IPExpo Manchester

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Dr David Everett will be presenting 'The Security of the Blockchain' at IPExpo Manchester (www.ipexpomanchester.com) on Wednesday 18th May 2016 at 3pm.

"It is a popular concept that the Blockchain provides a solution to business problems currently not adequately addressed. It was originally invented to provide the backbone to the Bitcoin peer to peer electronic cash system which it does extremely well in a secure fashion. However this does not necessarily mean that the Blockchain technology can provide better and more secure ways of protecting other digital assets. This presentation will discuss these security issues".

For additional information or to arrange an interview please contact: Lesley on 01903 721 668   This email address is being protected from spambots. You need JavaScript enabled to view it.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Tony Wakefield, Training Director at Telecoms Academy talks to Dr David Everett, CEO at Microexpert, about mobile security.

David reflects on data security with all the latest technology available and how they compare to users not being totally aware of keeping mobile data safe.

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

MicroKey is a Smart card that is used during authentication to establish an encrypted and authenticated session using TLS.

MicroKey offers both a high level of communication security and convenience for usage in many sectors. Online banking, remote access, online bookings and purchases, and secure voice communications is just some of these areas.

Microexpert Guide - Cryptographic Algorithm and Key Size P2

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

This is one of those subjects that you could argue everyday but the basics are actually very simple. It is generally agreed that the strength of a cryptographic algorithm can be defined by the level of computational complexity necessary to break the algorithm. If the algorithm is perfect then that should be the effort required to exhaust the key. In practice this means you have to try the algorithm for every key to get a matching pair of plain texts and cipher texts, the brute force attack.

Founded in 1983

Microexpert has been at the forefront of cryptographic design and development since 1983, having grown organically over the last 30+ years we have consistently supported the industry in delivering the highest quality, and through continuous training and development shaped our team to deliver the best service to our clients.

©2019 Microexpert. Registered number 01755695.

Search