Method for securing software via late stage processor...
Method for securing software via late stage processor...
Method for selective encryption within documents
Method for setting security channel based on MPCP between...
Method for sharing encrypted data region among processes in...
Method for storing and operating on data units in a security...
Method for the execution of an encryption program for the...
Method for using a compact disk as a smart key device
Method for using shared library in tamper resistant...
Method for verifying the execution of a software product
Method of and apparatus for reproducing information, and...
Method of and apparatus for reproducing information, and...
Method of and apparatus for reproducing information, and...
Method of and apparatus for reproducing information, and...
Method of and device for generating a key
Method of and system for recording and reproducing...
Method of deciphering ciphered data and apparatus for same
Method of defending software from debugger attacks
Method of detaching a security device from a personal computer
Method of editing/restoring electronic information