Turning Points in the Development of Blended Families
Baxter, Leslie A., Braithwaite, Dawn O., Nicholson, John H.
Published in Journal of social and personal relationships (01.06.1999)
Published in Journal of social and personal relationships (01.06.1999)
Get full text
Journal Article
"A Great Day for Oiled Pelicans:” BP, Twitter, and the Deep Water Horizon Crisis Response
Laura Richardson Walton, Skye C. Cooley, John H. Nicholson
Published in Public relations journal (2007) (01.09.2012)
Get full text
Published in Public relations journal (2007) (01.09.2012)
Journal Article
Authenticating suspect data using key tables
CHALLENER DAVID CARROLL, NICHOLSON JOHN H, PENNISI JOSEPH MICHAEL, WALTERMANN ROD D
Year of Publication 20.09.2011
Get full text
Year of Publication 20.09.2011
Patent
Authenticating suspect data using key tables
Challener, David Carroll, Nicholson, John H, Pennisi, Joseph Michael, Waltermann, Rod D
Year of Publication 20.09.2011
Get full text
Year of Publication 20.09.2011
Patent
Authenticating suspect data using key tables
DAVID CARROLL CHALLENER, JOHN H NICHOLSON, ROD DAVID WALTERMANN, JOSEPH MICHAEL PENNISI
Year of Publication 23.02.2011
Get full text
Year of Publication 23.02.2011
Patent
Vorrichtung und Verfahren zum Freigeben von Anwendungen auf einem Sicherheitsprozessor
NICHOLSON, JOHN H. III, PENNISI, JOSEPH, CHALLENER, DAVID CARROLL, WALTERMANN, ROD D
Year of Publication 10.02.2011
Get full text
Year of Publication 10.02.2011
Patent
Authentifikation von verdächtigen Daten unter Verwendung von Schlüsseltabellen
Challener, David Caroll, Pennisi, Joseph Michael, Waltermann, Rod D, Nicholson, John H
Year of Publication 16.02.2017
Get full text
Year of Publication 16.02.2017
Patent
APPARATUS AND METHOD FOR ENABLING APPLICATIONS ON A SECURITY PROCESSOR
CHALLENER, DAVID, CARROLL, NICHOLSON, JOHN H III, PENNISI, JOSEPH, WALTERMANN, ROD D
Year of Publication 22.10.2009
Get full text
Year of Publication 22.10.2009
Patent
Authenticating suspect code using key tables
DAVID CARROLL CHALLENER, JOHN H NICHOLSON, ROD DAVID WALTERMANN, JOSEPH MICHAEL PENNISI
Year of Publication 27.05.2009
Get full text
Year of Publication 27.05.2009
Patent
Authenticating suspect data using key tables
DAVID CARROLL CHALLENER, JOHN H NICHOLSON, ROD D WALTERMANN, JOSEPH MICHAEL PENNISI
Year of Publication 22.04.2009
Get full text
Year of Publication 22.04.2009
Patent
Authenticating suspect data using key tables
CHALLENER DAVID CARROLL, NICHOLSON JOHN H, PENNISI JOSEPH MICHAEL, WALTERMANN ROD D
Year of Publication 03.07.2008
Get full text
Year of Publication 03.07.2008
Patent
Authenticating suspect code at a Trusted Platform Module
DAVID CARROLL CHALLENER, JOHN H NICHOLSON, ROD D WALTERMANN, JOSEPH MICHAEL PENNISI
Year of Publication 02.07.2008
Get full text
Year of Publication 02.07.2008
Patent
Apparatus and method for enabling applications on a security processor
PENNISI JOSEPH, NICHOLSON JOHN H, WALTERMANN ROD D, CHALLENER DAVID C
Year of Publication 01.05.2008
Get full text
Year of Publication 01.05.2008
Patent