Data authentication method and data authentication system
Data conversion system for protecting software against...
Decryption method
Detection of suspect software objects and signatures after...
Detection of suspicious privileged access to restricted...
Device and method capable of verifying program operation of...
Disk drive which provides a secure boot of a host computer...
Distinguishing legitimate modifications from malicious...
Distinguishing legitimate modifications from malicious...
Dynamic verification of validity of executable code