Michael F. Angelo focuses on Computer security, Computer network, Embedded system, One-time password and Password. In the field of Computer security, his study on Security system and Data security overlaps with subjects such as Covert channel, Logical security and Action. His work in the fields of Encryption overlaps with other areas such as Multipath I/O.
His Embedded system research includes elements of Keyboard computer, System Management Mode, Systems management, Malware and Form factor. His One-time password research is multidisciplinary, relying on both Security token and S/KEY. Michael F. Angelo has included themes like Hash chain and Smart card in his Security token study.
His scientific interests lie mostly in Computer network, Embedded system, Computer security, Computer hardware and Encryption. Michael F. Angelo focuses mostly in the field of Computer network, narrowing it down to matters related to Hash function and, in some cases, Blockchain. His research in Embedded system intersects with topics in Mode, Global Positioning System and Command and control.
His Password and Security token study in the realm of Computer security connects with subjects such as Warranty and Logical security. His biological study spans a wide range of topics, including Network storage and Operating system. His research integrates issues of Password policy and Syskey in his study of S/KEY.
His main research concerns Computer security, Blockchain, Authentication, Computer network and Encryption. His work in the fields of Computer security, such as Security token, Cyber-attack and Password, overlaps with other areas such as Threshold number and Computing systems. His Authentication research is multidisciplinary, relying on both Session, Embedded system and Mobile device.
His research in the fields of Credential overlaps with other disciplines such as Mobile database. Michael F. Angelo combines subjects such as Virtual machine, Hash function, Cloud computing and Key with his study of Encryption. His study explores the link between Hash function and topics such as Tracking that cross with problems in Operating system.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
System and method for performing secure device communications in a peer-to-peer bus architecture
Michael F. Angelo;Sompong P. Olarig;David R. Wooten;Dan J. Driscoll.
Secure software registration and integrity assessment in a computer system
Michael F. Angelo.
After the fact protection of data in remote personal and wireless devices
Michael Angelo;Manuel Novoa;Sompong Olarig.
Smart card with fingerprint image pass-through
Michael F. Angelo;Steve H. Park;Mark B. Tellez.
Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password
Michael F. Angelo.
Hardware theft-protection architecture
Sompong P. Olarig;Michael F. Angelo;Kenneth A. Jansen.
Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm
Michael F. Angelo.
Secure two-piece user authentication in a computer network
Michael F. Houston Angelo;Sompong P. Cypress Olarig.
Error detection and correction
Sompong P. Olarig;Michael F. Angelo.
Method for securely communicating remote control commands in a computer network
Michel F. Angelo;David L. Collins;Kenneth A. Jansen;Donald D. Kim.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: