Method for sharing encrypted data region among processes in...
Method for storing and operating on data units in a security...
Method for the execution of an encryption program for the...
Method for using a compact disk as a smart key device
Method for using shared library in tamper resistant...
Method for verifying the execution of a software product
Method of and apparatus for reproducing information, and...
Method of and apparatus for reproducing information, and...
Method of and apparatus for reproducing information, and...
Method of and apparatus for reproducing information, and...
Method of and device for generating a key
Method of and system for recording and reproducing...
Method of deciphering ciphered data and apparatus for same
Method of defending software from debugger attacks
Method of detaching a security device from a personal computer
Method of editing/restoring electronic information
Method of encrypting and decrypting data stored on a storage...
Method of obfuscating computer instruction streams
Method of obscuring cryptographic computations
Method of operating a microcomputer system