Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where George C. Wilson is active.

Publication


Featured researches published by George C. Wilson.


Archive | 1998

Single sign-on (SSO) mechanism personal key manager

Yi Fang; I-Lung Kao; Ivan Matthew Milman; George C. Wilson


Archive | 1998

Single sign-on (SSO) mechanism having master key synchronization

Yi Fang; I-Lung Kao; George C. Wilson


Archive | 2011

Virtual machine images encryption using trusted computing group sealing

Rajiv Augusto Santos Galvao de Andrade; Steven A. Bade; Jeb R. Linton; Dimitrios Pendarakis; George C. Wilson; Lee H. Wilson


Archive | 2001

Method and apparatus for lightweight rekeying of a master key in a single sign-on system

I-Lung Kao; George C. Wilson


Archive | 2008

METHOD FOR SECURE ACCESS TO AND SECURE DATA TRANSFER FROM A VIRTUAL SENSITIVE COMPARTMENTED INFORMATION FACILITY (SCIF)

George C. Wilson; Daniel Horacio Jones; Emily Jane Ratliff; Thomas Girard Lendacky


Archive | 2013

Extending Platform Trust During Program Updates

Nathan D. Fontenot; Joel H. Schopp; Michael T. Strosaker; George C. Wilson


Archive | 2008

Method for avoiding virtual world fatigue by maintaining avatar characteristics in an avatar wallet

Daniel Horacio Jones; Thomas Girard Lendacky; Emily Jane Ratliff; George C. Wilson


Archive | 2016

Source code search engine

Nathan D. Fontenot; Fionnuala G. Gunter; Michael T. Strosaker; George C. Wilson


Archive | 2015

BINARY FILE FOR COMPUTER PROGRAM HAVING MULTIPLE EXECUTABLE CODE VARIANTS FOR A FUNCTION THAT ARE EXECUTABLE ON A SAME PROCESSOR ARCHITECTURE

Nathan D. Fontenot; Fionnuala G. Gunter; Michael T. Strosaker; George C. Wilson


Archive | 2013

Intermediate Trust State

Nathan D. Fontenot; Jeffrey David George; Joel H. Schopp; Michael T. Strosaker; George C. Wilson

Researchain Logo
Decentralizing Knowledge