Methods and apparatus for secure distribution of program...
Methods and apparatus for secure personal identification...
Methods and devices for transferring security data between...
Methods and systems for managing patient authorizations...
Methods and systems for promoting security in a computer...
Methods and systems for promoting security in a computer...
Methods and systems for tamper resistant files
Methods and systems of protecting digital content
Methods and systems providing per pixel security and...
Methods of attack on a content screening algorithm based on...
Methods of intrusion detection and prevention in secure...
Methods of providing integrated circuit devices with data...
Methods, software programs, and systems for electronic...
Methods, software programs, and systems for electronic...
Mobile phone with an encryption function
Mobile security system and method
Multi-featured power meter with feature key
Multi-view personalized communications agent
Multiple secure socket layer keyfiles for client login support