Protected platform identity for digital signing
Protected storage of core data secrets
Protectedly reading out an enciphered, cryptographic key
Protecting access to microcontroller memory blocks
Protecting against spoofed DNS messages
Protecting content from illicit reproduction by proof of...
Protecting content from illicit reproduction by proof of...
Protecting content from illicit reproduction by proof of...
Protecting decrypted compressed content and decrypted...
Protecting information in a system
Protecting privacy of networked devices containing...
Protecting resources in a distributed computer system
Protecting smart cards from power analysis with detachable...
Protecting software from unauthorized use by applying...
Protection domains to provide security in a computer system
Protection of biometric data via key-dependent sampling
Protection of information transmitted over communications...
Protection of laptop computers from theft in the stream of...
Protection of the core part of computer against external...
Protection of the distribution of digital documents in a...