Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ronald F. Buskey is active.

Publication


Featured researches published by Ronald F. Buskey.


international conference on parallel processing | 2006

Protected JTAG

Ronald F. Buskey; Barbara B. Frosik

In this paper, we consider a particular aspect of an effort to define trusted computing solutions. One of the hardware features of an embedded device is the JTAG (joint test action group) port that allows easy access to a processor for debugging purposes. This access is a potential security threat in a high assurance environment. This paper presents a solution of a protected JTAG. The purpose of providing protected JTAG, as part of the trusted computing platform, is to prevent access to private and confidential information by unauthorized users and yet allow debugging functions. The presented solution introduces different levels of access. The level of users access is based on the users permissions


Archive | 2006

Protected port for electronic access to an embedded device

Ronald F. Buskey; Barbara B. Frosik


Archive | 2003

Digital content acquisition and distribution in digitial rights management enabled communications devices and methods

Kevin C. Mowry; Ronald F. Buskey


Archive | 2005

Method and apparatus for authenticating components

Ronald F. Buskey; Larry C. Puhl; Duane C Rabe


Archive | 2006

METHOD AND APPARATUS FOR AUTHENTICATING APPLICATIONS TO SECURE SERVICES

Dean H. Vogler; Ronald F. Buskey


Archive | 2006

Method for elliptic curve public key cryptographic validation

Ronald F. Buskey; Barbara B. Frosik; Douglas A. Kuhlman


Archive | 2006

Encryption and verification using partial public key

Barbara B. Frosik; Ronald F. Buskey; Douglas A. Kuhlman


Archive | 2004

Distributed digital signature generation

Joel D. Voss; Ronald F. Buskey; Joseph M. Hansen; David H. Hartley; Michael J. Terrington


Archive | 2007

Multi-band signal detection

Kevin J. Bush; John R. Barr; Charles P. Binzel; Ronald F. Buskey; Brian D. Storm


Archive | 2007

Method and Apparatus for Reducing Buffer Overflow Exploits by Computer Viruses

Kent D. Moat; Ronald F. Buskey; Brian G. Lucas

Collaboration


Dive into the Ronald F. Buskey's collaboration.

Researchain Logo
Decentralizing Knowledge