Software auditing mechanism for a distributed computer enterpris
Software data protection mechanism
Software piracy detection system
Software protection method and apparatus
Software security method and systems
Source data compression and decompression in code symbol printin
Speech and control message encrypton in cellular radio
Split-key key-agreement protocol
Split-key key-agreement protocol
Stable disc controller ID from unstable comparator outputs
Stand alone device for providing security within computer networ
Stegotext encoder and decoder
Storm alert for emergencies
Stream-cipher method and apparatus
Structure and method for secure image transmission
Subscriber site method and apparatus for decoding and selective
Subscription television system
Super secure migratable keys in TCPA
Sustaining chaos by using basin boundary saddles
Switched channel system