Software use method control system
Software-defined communications system execution control
Solicited authentication of a specific user
Specifying security protocols and policy constraints in...
Specifying security protocols and policy constraints in...
Splitting knowledge of a password
SS7 firewall system
Stack based access control using code and executor identifiers
Stack memory protection
Stack-based access control using code and executor identifiers
Stack-based system and method to combine security...
Stolen computer detection and protection
Storage apparatus access control apparatus for a recording...
Storage area network(SAN) booting method
Storage area network(SAN) booting method
Storage device and access control method
Subscription access system for use with an untrusted network
Supplicant and authenticator intercommunication mechanism...
Supplicant and authenticator intercommunication mechanism...
Synchronous message control system in a Kerberos domain