Method for processing multiple security policies applied to...
Method for prohibiting unauthorized access in a...
Method for protecting a security module and arrangement for...
Method for protecting executable software programs against infec
Method for providing repeated contact with software end-user...
Method for providing repeated contact with software end-user...
Method for providing security to a computer on a computer...
Method for providing single step log-on access to a...
Method for providing single step log-on access to a...
Method for providing single step log-on access to a...
Method for remotely managing a remote device using an...
METHOD FOR REPRODUCING DATA, APPARATUS FOR REPRODUCING DATA,...
Method for retarding the duplication of a data-storage device
Method for safely transferring data and applications onto a chip
Method for secure function execution by calling address...
Method for secure key management using a biometric
Method for secure transfer of data by a communication network
Method for securing communication by selecting an encoding...
Method for securing data relating to users of a public-key...
Method for securing safety of electronic information