Upload

Loading icon Loading...

This video is unavailable.

From "Useless Math," Powerful Security

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like WPI's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike WPI's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add WPI's video to your playlist.

Uploaded on Feb 11, 2010

Sensor networks are made up of devices with the tiny processors and meager power supplies, which limit their ability to run the strong cryptosystems that are used to protect data in more robust computing environments. William Martin, professor of mathematical sciences at Worcester Polytechnic Institute (WPI), has drawn on mathematical systems that were once thought to have no practical use to help make public key cryptography run effectively on such devices.

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

The interactive transcript could not be loaded.

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Loading icon Loading...

Loading...
Working...
to add this to Watch Later

Add to