Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where James L. Tucker is active.

Publication


Featured researches published by James L. Tucker.


Archive | 2011

Memory location specific data encryption key

Thomas Cordella; John Profumo; James L. Tucker


Archive | 2006

Method and system to detect tampering using light detector

Scott G. Fleischman; James L. Tucker


Archive | 2010

TAMPER EVENT DETECTION

William J. Dalzell; Scott G. Fleischman; James L. Tucker


Archive | 2006

Securing standard test access port with an independent security key interface

James L. Tucker; Brian R. Bernier


Archive | 2011

DATA PROTECTION WHEN A MONITOR DEVICE FAILS OR IS ATTACKED

William J. Dalzell; James L. Tucker; Kenneth H. Heffner


Archive | 2006

External key to provide protection to devices

James L. Tucker


Archive | 2006

Card slot anti-tamper protection system

Scott G. Fleischman; James L. Tucker; William J. Dalzell


Archive | 2007

Methods and systems for recognizing tamper events

James L. Tucker; Kara L. Warrensford; William J. Dalzell; Scott G. Fleischman


Archive | 2007

System and method for protecting networked security devices

James L. Tucker


Archive | 2007

Method and apparatus for erasure of data from a data storage device located on a vehicle

William J. Dalzell; Scott G. Fleischman; James L. Tucker

Collaboration


Dive into the James L. Tucker's collaboration.

Researchain Logo
Decentralizing Knowledge