Off-loading data re-encryption in encrypted data management...
Offline message security via selective data replication
On-line randomness test for detecting irregular pattern
One-way data conversion apparatus and device authentication syst
Open database system wherein access by subscribers to a network
Operational methods for a secure node in a computer network
Operational optimization of a shared secret Diffie-Hellman...
Opportunistic use of null packets during encryption/decryption
Optical communications network
Optical disk player
Optical out-of-band key distribution
Optical transmission system implementing encrypting by determini
Optimal L2 tracking in a SPS receiver under encryption without k
Optimized security functionality in an electronic system
Organic keyed encryption
Organization-based content rights management and systems,...