User-based digital rights management
User-controlled document processing
User-transparent security method and apparatus for authenticatin
Using trusted associations to establish trust in a computer netw
Utilization of encrypted hard drive content by one DVR...
Utilizing a key for enciphering and deciphering that is...
Utilizing data reduction in steganographic and cryptographic...
Utilizing data reduction in stegnographic and cryptographic...