Implementation and use of PII data access control facility...
Implementation of role-based access control in multi-level secur
Implementing digital signatures for data streams and data archiv
Implementing nonrepudiation and audit using authentication...
Implicit access for communications pathway
Implicit certificate scheme
Implicit certificate verification
Implicit population of access control lists
Implicit trust of authorship certification
Importing information onto a chip card
Imprinting an identification certificate
Including a metric in a digital watermark for media...
Incorporating security certificate during manufacture of...
Increasing integrity of watermarks using robust features
Increasing peer privacy
Increasing peer privacy
Indicating status for digital signatures
Indicating status for digital signatures
Indigenous authentication for sensor-recorders and other...
Indirect data protection using random key encryption