Protecting sensitive data associations
Protection for customer programs (EPROM)
Protection of digital content using block cipher crytography
Protection of processes running in a computer system
Protection of software again against unauthorized use
Protection of software using a challenge-response protocol...
Protocol scripting language for safe execution in embedded...
Providing a protected volume on a data storage device
Providing secure input and output to a trusted agent in a...