Protecting access to microcontroller memory blocks
Protecting decrypted compressed content and decrypted...
Protecting resources in a distributed computer system
Protecting smart cards from power analysis with detachable...
Protection domains to provide security in a computer system
Protection of biometric data via key-dependent sampling
Protection of laptop computers from theft in the stream of...
Protection of the core part of computer against external...
Protocol-level malware scanner
Providing break points in a malware scanning operation
Providing internet protocol (IP) security
Providing non-proxy TLS/SSL support in a content-based load...
Providing secure connections for data transmission
Providing security for external access to a protected...
Proximity detection of valid computer user
Public network access server having a user-configurable...
Real-time alert mechanism for signaling change of system...
Real-time media communications over firewalls using a...
Recovery of online sessions for dynamic directory services
Reference cell for integrated circuit security