Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where James W. Sweeny is active.

Publication


Featured researches published by James W. Sweeny.


Archive | 2001

Password exposure elimination for digital signature coupling with a host identity

Thomas L. Gindin; Messaoud Benantar; James W. Sweeny; John C. Dayka


Archive | 2000

Identity vectoring via chained mapping records

Richard H. Guski; Walter B. Farrell; James W. Sweeny; Thomas Joseph Szczygielski; John M. Thompson


Archive | 2008

Method and Apparatus for Transitive Program Verification

John C. Dayka; Walter Barlett Farrell; Richard H. Guski; James W. Sweeny


Archive | 2004

Method, system, and storage medium for eliminating password exposure when requesting third-party attribute certificates

Messaoud Benantar; Thomas L. Gindin; James W. Sweeny


Archive | 2001

Method and apparatus for using host authentication for automated public key certification

Messaoud Benantar; John C. Dayka; Thomas L. Gindin; James W. Sweeny


Archive | 2013

Timestamp systems and methods

Michael Osborne; James W. Sweeny; Tamas Visegrady


Archive | 2012

Scalable, highly available, dynamically reconfigurable cryptographic provider with quality-of-service control built from commodity backend providers

John C. Dayka; Michael J. Jordan; James W. Sweeny; Tamas Visegrady


Archive | 2004

Method, system, and storage medium for creating a proof of possession confirmation for inclusion into an attribute certificate

Messaoud Benantar; Thomas L. Gindin; James W. Sweeny


Archive | 2017

FORMAT-PRESERVING ENCRYPTION OF BASE64 ENCODED DATA

Steven R. Hart; Eysha S. Powers; James W. Sweeny


Archive | 2015

Secure format-preserving encryption of data fields

Todd W. Arnold; John C. Dayka; Steven R. Hart; Geoffrey George Jackson; Eysha S. Powers; James W. Sweeny

Researchain Logo
Decentralizing Knowledge