"We work on transforming data streams from multiple sources to analytics and intelligence.
As such we are delivering novel ICT Business Intelligence Services and Products, with an emphasis on Big-Open-Linked Data, Social Network Analysis, Wearable/IoT, Cloud-based systems, Mobile technologies, and other Business Solutions."
"We work on transforming data streams from multiple sources to analytics and intelligence.
As such we are delivering novel ICT Business Intelligence Services and Products, with an emphasis on Big-Open-Linked Data, Social Network Analysis, Wearable/IoT, Cloud-based systems, Mobile technologies, and other Business Solutions."
"We work on transforming data streams from multiple sources to analytics and intelligence.
As such we are delivering novel ICT Business Intelligence Services and Products, with an emphasis on Big-Open-Linked Data, Social Network Analysis, Wearable/IoT, Cloud-based systems, Mobile technologies, and other Business Solutions."
"We work on transforming data streams from multiple sources to analytics and intelligence.
As such we are delivering novel ICT Business Intelligence Services and Products, with an emphasis on Big-Open-Linked Data, Social Network Analysis, Wearable/IoT, Cloud-based systems, Mobile technologies, and other Business Solutions."
Project Acronym: FutureTPM
Project Full Title: Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module
Duration: 01/01/2018 – 31/12/2020
Topic: DS-06-2017 - Cybersecurity PPP: Cryptography
Project Website: futuretpm.eu
Suite5 in FutureTPM
In FutureTPM, Suite5 works on refactoring its S5 Personal Data Analytics Suite (S5Tracker) in order to leverage encryption based on the Trusted Platform Module (TPM) technology, and transform it into a quantum resistance application that is built in accordance with the FutureTPM outcomes.
The goal of FutureTPM is to design a Quantum-Resistant (QR) Trusted Platform Module (TPM) by designing and developing QR algorithms suitable for inclusion in a TPM. The algorithm design will be accompanied with implementation and performance evaluation, as well as formal security analysis in the full range of TPM environments: i.e. hardware, software and virtualization environments.
Other resources: https://cordis.europa.eu/project/rcn/213057/en