Technique for implementing a security algorithm
Transmitting data words
Transparently embedding non-compliant data in a data stream
Canada
World
United States