Method for automized and synchronous execution of customized...
Method for batching events for transmission by software agent
Method for binding networked devices
Method for blocking denial of service and address spoofing...
Method for broadcast encryption and key revocation of...
Method for certifying the authenticity of digital objects by...
Method for changing a security policy during processing of a...
Method for checking the authenticity of a data medium
Method for checking user access
Method for checkpointing and reconstructing separated but...
Method for combining transfer functions with predetermined...
Method for communicating and controlling transactions...
Method for controlling access to a multiplicity of objects...
Method for controlling access to a network by a wireless client
Method for controlling access to electronically provided...
Method for controlling access within a distributed system...
Method for controlling independent secure transactions by...
Method for controlling security of a computer removably...
Method for copy protecting a record carrier, copy protected...
Method for creating virtual service connections to provide a...