Method for checking user access
Method for checkpointing and reconstructing separated but...
Method for combining transfer functions with predetermined...
Method for communicating and controlling transactions...
Method for controlling access to a multiplicity of objects...
Method for controlling access to a network by a wireless client
Method for controlling access to electronically provided...
Method for controlling access within a distributed system...
Method for controlling independent secure transactions by...
Method for controlling security of a computer removably...
Method for copy protecting a record carrier, copy protected...
Method for creating virtual service connections to provide a...
Method for data preparation and watermark insertion
Method for data preparation and watermark insertion
Method for data transfer in a network
Method for defining and verifying user access rights to a comput
Method for detecting dedicated link between an end station...
Method for detecting invalid electronic storage media and...
Method for detecting plagiarism
Method for detecting security module for link protection in...