Using mobility tokens to observe malicious mobile code
Using multiple watermarks to protect content material
Using SYN-ACK cookies within a TCP/IP protocol
Using TCP to authenticate IP source addresses
Using time to determine a hash extension
Using token-based signing to install unsigned binaries
Using trusted communication channel to combat user...
Using voice over IP or instant messaging to connect to...
Using watermarking to reduce communication overhead