Wireless perimeter security device and network using same
Wireless proximity containment security
Wireless proximity detector security feature
Wireless reception system
Wireless secure device
Wireless telephone with frequency inversion scrambling
Wireless telephone with frequency inversion scrambling
Wireless telephony with steganography
Wireless transaction and information system
Wireless transmission system for PM modulation signal
Witness-based certificate revocation system
WLAN error control
World Wide Web registration information processing system
Write protection device for computer hard disk
X window security system
XZ-elliptic curve cryptography with secret key embedding
Yaksha, an improved system and method for securing communication
Z-transform implementation of digital watermarks
Z-transform implementation of digital watermarks
`Virtual` encryption scheme combining different encryption opera