Detecting collusion among multiple recipients of...
Detecting malicious software by analyzing patterns of system...
Detection and elimination of macro viruses
Detection method of illegal access to computer system
Detection of an attack such as a pre-attack on a computer...
Detection of computer viruses spanning multiple data streams
Determining theft of grammar code
Deterministic user authentication service for communication netw
Deterministic user authentication service for communication...
Deterministic user authentication service for communication...
Device and method for providing security for a computer...
Device for and method of secure computing using virtual...
Device for protecting an electronic apparatus
Device for securing a telephone link between two subscriber...
Device for the protection of the access to memory words
Device in a system operating with CAN-protocol and in a...
Device in a system operating with can-protocol and in a...
Device security mechanism based on registered passwords
Digital compact disc player security system reproducing method a
Digital compact disc player security system reproducing...