Method for negotiating weakened keys in encryption systems
Method for negotiating weakened keys in encryption systems
Method for network self security assessment
Method for non-disclosing password entry
Method for offloading encryption and decryption of a message...
Method for operating proactively secured applications on an...
Method for optimizing of data transmission
Method for organizing virtual networks while optimizing...
Method for overcoming the single point of failure of the...
Method for packet authentication in the presence of network...
Method for parallel approval of an electronic document
Method for performing remote operations
Method for permanent decryption of selected sections of an...
Method for portability of information between multiple servers
Method for preventing a BIOS to get viruses
Method for preventing and detecting hash collisions of data...
Method for preventing counterfeiting of articles of manufacture
Method for preventing software piracy during installation...
Method for processing access-request message for packet service
Method for processing multiple security policies applied to...