Sign Up  My Account  About  Contact  

The MySQIF Magic

Patents, Technical Papers, Resources

Use your browser Find feature (Ctrl+F) to search for topical content below.

McKibben et al. (Nov. 21,2006). U.S. Patent No. 7,139,761, Dynamic Association of Electronic Stored Information with Iterative Workflow Changes. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7139761
McKibben et al. (Jun. 05,2012). U.S. Patent No. 8,195,714, Context Instantiated Application Protocol. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/8195714
McKibben et al. (Jun. 05,2012). U.S. Patent No. 7,925,246, Radio/Telephony Interoperability System. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7925246
FIRST AMENDED MILLER ACTNOTICE. (Apr. 25, 2019). Leader Technologies, Inc. to the U.S. Executive pursuant to 40 U.S.C. §3131 et seq. Leader Technologies, Inc.
Petition for Writ of Certiorari. (Nov. 16, 2012). Leader Techologies Inc. v. Facebook Inc., No-12-617. U.S. Supreme Court.
Carlson, Albert H., Mandeep Singh. (Jan. 8-10, 2024). Exploring Polymorphic Algorithms and Their Use in Cryptography. IEEE, Conference: 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC) At: Las Vegas, NV.
Mandeep Singh, Albert Carlson. (May 31, 2024). An Approach to Watermarking Using Polymorphic Algorithms For Increased Data Security. Austin Community College/IEEE.
Carlson et al. (Nov. 03, 2015). U.S. Patent No. 9,178,514, Polymorphic Hardware Engine. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/9178514
Albert Henry Carlson et al. (Sep. 04, 2018). U.S. Patent No. 10,069,805, Polymorphic one time pad matrix. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10069805
Carlson; Albert Henry et al. (Dec. 25, 2018). U.S. Patent No. 10,162,985, Virtual Polymorphic Hardware Engine. USPTO. Source: https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10162985
Carlson et al. (Nov. 19, 2019). U.S. Patent No. 10,482,290. Virtual Polymorphic Hardware Engine. USPTO. Source: ​https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10482290
Carlson et al. (Feb. 18, 2020). U.S. Patent No. 10,567,351, Polymorphic One Time Pad Matrix. USPTO. Source: ​https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10567351.pdf
Carlson, Albert Henry. (Feb. 18, 2021). U.S. Patent Appl. No. 10,051,006. Blind Key Generator and Exchange. USPTO. https://patentimages.storage.googleapis.com
/bd/8b/c1/65d851cd296de2/US20210051006A1.pdf
Carlson et al. (Nov. 06, 2018). U.S. Patent No. 10,122,684, Local Area Network Electronic Perimeter Security. USPTO. Source: ​https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10122684.pdf
Carlson et al. (Mar. 30, 2021). U.S. Patent No. 10,965,710. Dynamic PIN Configurator. USPTO. Source: ​https://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/10965710
Carlson, Albert Henry; Whilhite, Elizabeth et al. (Dec. 02, 2004). WO 2004/105296. Secure Communications. WIPO. Source: https://patentimages.storage.googleapis.com/06/c1/01/35afaa11ecc87a/WO2004105296A2.pdf
A . Carlson, I. K. Dutta, B. Ghosh and M. Totaro. (Dec. 06-09, 2021). Modeling Polymorphic Ciphers. 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), Gandia, Spain, 2021, pp. 1-5, doi:https://10.1109/FMEC54266.2021.9732571
A. Carlson, B. Ghosh, I.K. Dutta, S.. Key Space Reduction Using Isomorphs, 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2021, pp. 0970-0975, doi:https://10.1109/IEMCON53756.2021.9623158
A. H. Carlson, R. E. Hiromoto and R. B. Wells. (Sep. 15-17, 2011). Breaking block and product ciphers applied across byte boundaries. Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisation and Advanced Computing Systems, Prague, 2011, pp. 733-736, doi:https://doi.org/10.1109/IDAACS.2011.6072867
B. Ghosh, I. K. Dutta, S. Khare , A. Carlson and M. Totaro. (Oct. 27-30, 2021). Isomorphic Cipher Reduction, 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, B.C., Canada, 2021, pp. 0947-0953, doi:https://doi.org/10.1109/IEMCON53756.2021.9623135
A. Carlson, B. Ghosh, I. K. Dutta, S. Khare and M. Totaro . (Oct. 27-30, 2021). Key Space Reduction Using Isomorphs, 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2021, pp. 0970-0975, doi:https://doi.org/10.1109/IEMCON53756.2021.9623158
A. H. Carlson, R. E. Hiromoto and R. B. Wells. (Sep. 15-17,  2011).  Breaking block and product ciphers applied across byte boundaries, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, Prague, 2011, pp. 733-736, doi:https://doi.org/10.1109/IDAACS.2011.6072867
B. Ghosh, I. K. Dutta, A. Carlson, M. Totaro and M. Bayoumi. (Oct. 28-31, 2020). An Empirical Analysis of Generative Adversarial Network Training Times with Varying Batch Sizes, 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2020, pp. 0643-0648, doi:https://doi.org/10.1109/UEMCON51285.2020.9298092
Carlson, Albert, Marc Laude, Deborah Frincke . (Aug. 01, 2003). Railway Security Issues: A Survey of Developing Railway Technology, Conference: CCCT 2003 , Orlando, Florida. Source:https://www.atdlines.com/pdf/rsi-secur.pdf
A. Carlson, I. Dutta and B. Ghosh. (Oct.  03-05, 2022). Using the Collision Attack for Breaking Cryptographic Modes, 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2022, pp. 1-7, doi:https://doi.org/10.1109/ICCCNT54827.2022.9984325
Albert H. Carlson. (Apr. 01, 2009). Defense in Depth: Perspectives on utility security from a military intelligence viewpoint, Western Power and Delivery Conference, Spokane, WA. Source: Research Gate.
A. Carlson , S. R. Mikkilineni, M. W. Totaro, R. B. Wells and R. E. Hiromoto. (Jul. 19-22, 2022). Equivalence of Product Ciphers to Substitution Ciphers and their Security Implications, 2022 International Symposium on Networks, Computers and Communications (ISNCC), Shenzhen, China, 2022, pp. 1-6, doi:https://doi.org/10.1109/ISNCC55209.2022.9851719
Albert H. Carlson. (May01, 2012). SET THEORETIC ESTIMATION APPLIED TO THE INFORMATION CONTENT OF CIPHERS AND DECRYPTION, Final Dissertation, Thesis for Doctor of Philosophy, Computer Science, University of Idaho. Source: Research Gate.
I. K. Dutta, B. Ghosh, A. Carlson, M. Totaro and M. Bayoumi . (Oct. 28-31, 2020)Generative Adversarial Networks in Security: A Survey, 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2020, pp. 0399-0405, doi:https://doi.org/10.1109/UEMCON51285.2020.9298135
A. Carlson, S. Khare, I. K. Dutta, B. Ghosh and M. Totaro. (Jan. 26-29, 2022)Space Selection and Abstraction in Set Theoretic Estimation, 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2022, pp. 0012-0020, doi:https://doi.org/10.1109/CCWC54503.2022.9720845
A. Carlson, S. R. Mikkilineni, M. W. Totaro, R. E. Hiromoto and R. B. Wells. (Jul. 19-22, 2022).  An Introduction to Local Entropy and Local Unicity,  2022 International Symposium on Networks, Computers and Communications (ISNCC), Shenzhen, China, 2022, pp. 1-7, doi:https://doi.org/10.1109/ISNCC55209.2022.9851755
B. Ghosh, I. Kalyan Dutta, A. Carlson and M. Totaro . (Oct. 20-22, 2020)Mathematical Modeling and Prediction of Neural Network Training based on RC Circuits, 2020 International Symposium on Networks, Computers and Communications (ISNCC) , Montreal, QC, Canada, 2020, pp. 1-4, doi: https://doi.org/10.1109/ISNCC49221.2020.9297244
B. Williams, A. Carlson and R. Hiromoto. (Oct. 03-05, 2022). Novel Innovations for Improving the Quality of Weak PRNGs, 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) , Kharagpur, India, 2022, pp. 1-6, doi:https://doi.org/10.1109/ICCCNT54827.2022.9984611
B. Williams, A. Carlson and R. Hiromoto . (Oct. 03-05, 2022). Novel Innovations that Failed to Improve Weak PRNGs2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2022, pp. 1-6, doi:https://doi.org/10.1109/ICCCNT54827.2022.9984517
I. Kalyan Dutta, B. Ghosh, A. H. Carlson and M. Bayoumi. (Jun. 02-16, 2020). Lightweight Polymorphic Encryption for the Data Associated with Constrained Internet of Things Devices, 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2020, pp. 1-6, doi:https://doi.org/10.1109/WF-IoT48130.2020.9221296
B. Williams, R. E. Hiromoto and A. Carlson. (Sep. 18-21, 2019). A Design for a Cryptographically Secure Pseudo Random Number Generator, 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Metz, France, 2019, pp. 864-869, doi:https://doi.org/10.1109/IDAACS.2019.8924431
Dr. Albert Carlson, Dr. Keeper L. Sharkey. (Aug. 19, 2022). NIST Quantum Proof Algorithm Analysis. Quantum Security Alliance (QSA).
Dr. Albert H. Carlson. (Aug. 03, 2022). Standard Password Practices for Organizations: Relative Theory and Recommendations. Quantum Security Alliance (QSA).
A. Carlson, H.C. Mumm, K.L. Sharkey, M.S. Watchorn. (Jul. 08, 2022). Quantum Chemistry for Detecting Cybersecurity Threats to Information Systems. Quantum Security Alliance (QSA).
Dr. Albert H. Carlson, Dr. Robert E. Hiromoto . (Jun. 21, 2013). Reduction of Key Space Using Isomorphs and Language Characteristics. Cloud+MD.
H. Idriss, P. Rojas, S. Alahmadi, T. Idriss, A. Carlson, and M. Bayoumi. (May 27, 2022 to Jun. 01, 2022). Shadow PUFs: Generating Temporal PUFs with Properties Isomorphic to Delay-Based APUFs, 2022 IEEE International Symposium on Circuits and Systems (ISCAS) , Austin, TX, USA, 2022, pp. 175-179, doi:https://doi.org/10.1109/ISCAS48785.2022.9937489
A. H. Carlson, R. B. Wells and R. E. Hiromoto. (Sep. 05-07, 2005). Using Set Theoretic Estimation to Implement Shannon Secrecy, 2005 IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications , Sofia, Bulgaria, 2005, pp. 435-438, doi: https://doi.org/10.1109/IDAACS.2005.283018
A. Carlson, I. Dutta, B. Ghosh and R. Hiromoto. (Oct. 12-15, 2022). The Problem with Regular Multiple Byte Block Boundaries in Encryption, 2022 IEEE 13th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) , Vancouver, BC, Canada, 2022, pp. 0055-0060, doi:https://doi.org/10.1109/IEMCON56893.2022.9946470
A. Carlson, G. Gang, T. Gang, B. Ghosh and I. K. Dutta. (Jan. 01-04, 2021). Evaluating True Cryptographic Key Space Size, 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) , New York, NY, USA, 2021, pp. 0243-0249, doi: https://doi.org/10.1109/UEMCON53757.2021.9666530
A. Carlson, S. R. Mikkilineni, M. W. Totaro and C. Briscoe. (Jul. 19-22, 2022). A Venona Style Attack to Determine Block Size, Language, and Attacking Ciphers, 2022 International Symposium on Networks, Computers and Communications (ISNCC) , Shenzhen, China, 2022, pp. 1-6, doi:https://doi.org/10.1109/ISNCC55209.2022.9851716
A. Carlson, S. R. Mikkilineni, M. W. Totaro, R. B. Wells and R. E. Hiromoto. (Jul. 19-22, 2022). Equivalence of Product Ciphers to Substitution Ciphers and their Security Implications, 2022 International Symposium on Networks, Computers and Communications (ISNCC) , Shenzhen, China, 2022, pp. 1-6, doi:https://doi.org/10.1109/ISNCC55209.2022.9851719 
B. Ghosh, I. K. Dutta, S. Khare, A. Carlson and M. Totaro. (Oct. 27-30, 2021). Isomorphic Cipher Reduction, 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) , Vancouver, BC, Canada, 2021, pp. 0947-0953, doi:https://doi.org/10.1109/IEMCON53756.2021.9623135
Ueli M. Maurer, James L. Massey. (Mar. 01, 1993). Cascade Ciphers: The Importance of Being First, pp.55-61. J. Cryptology. Source: https://doi.org/10.1007/BF02620231

Return periodically. More white papers are being added monthly.

Sign Up