Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas E. Tkacik is active.

Publication


Featured researches published by Thomas E. Tkacik.


Information Security Technical Report | 2005

An Advanced Trusted Platform for mobile phone devices

Carlin R. Covey; Mark D. Redman; Thomas E. Tkacik

The intent of trusted computing is to ensure that an information-processing device functions according to expectations. If the device has been designed to offer security protections, then it is reasonable for these expectations to include some assurance that the device will protect the security interests of the devices stakeholders. In the case of mobile phones, there are many different stakeholders that have diverse security interests. This paper discusses stakeholder interests in a mobile phone, describes how those interests are addressed using the Trusted Platform Module (TPM) specified by the Trusted Computing Group (TCG), and explains how improved protections are provided using the Freescale Advanced Trusted Platform (ATP).


Archive | 2007

Method and apparatus for secure scan testing

Thomas E. Tkacik; John E. Spittal; Jonathan Lutz; Douglas Hardy; Mark D. Redman; Gregory Schmidt; Steven Tugeberg; Michael D. Fitzsimmons; Darrell L. Carder


Archive | 2006

Multiple key security and method for electronic devices

Thomas E. Tkacik


Archive | 2009

Authenticated debug access for field returns

Asaf Ashkenazi; Ruchir Chhabra; Carlin R. Covey; David H. Hartley; Troy E. Mackie; Alistair N. Muir; Mark D. Redman; Thomas E. Tkacik; John J. Vaglica; Rodney D. Ziolkowski


Archive | 2005

Autonomous memory checker for runtime security assurance and method therefore

Mark D. Redman; Thomas E. Tkacik; Joel D. Feldman


Archive | 2008

Encryption apparatus with diverse key retention schemes

Thomas E. Tkacik; Asaf Ashkenazi


Archive | 2003

Method and apparatus for providing security for debug circuitry

William C. Moyer; Thomas E. Tkacik


Archive | 2008

Computing Device with Entry Authentication into Trusted Execution Environment and Method Therefor

Carlin R. Covey; Ronald B. Harvey; Mark D. Redman; Thomas E. Tkacik


Archive | 2007

Secure data access methods and apparatus

Thomas E. Tkacik


Archive | 2004

Method and apparatus for providing security in a data processing system

Michael J. Torla; Thomas E. Tkacik

Collaboration


Dive into the Thomas E. Tkacik's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge