Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Carl J. Persson is active.

Publication


Featured researches published by Carl J. Persson.


Archive | 2014

Trusted security zone access to peripheral devices

Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener


Archive | 2012

Systems and methods for provisioning and using multiple trusted security zones on an electronic device

Stephen J. Bye; Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener; Trevor D. Shipley


Archive | 2013

Trusted Security Zone Containers for the Protection and Confidentiality of Trusted Service Manager Data

Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener


Archive | 2012

Trusted access to third party applications systems and methods

Robin D. Katzer; Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener


Archive | 2012

System and methods for trusted internet domain networking

Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener


Archive | 2013

Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device

Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener


Archive | 2013

Point-of-sale and automated teller machine transactions using trusted mobile access device

Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener


Archive | 2013

JTAG fuse vulnerability determination and protection using a trusted execution environment

Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener


Archive | 2013

Trusted security zone re-provisioning and re-use capability for refurbished mobile devices

Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener


Archive | 2013

Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory

Lyle W. Paczkowski; William M. Parsel; Carl J. Persson; Matthew C. Schlesener

Collaboration


Dive into the Carl J. Persson's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge