Method for overcoming the single point of failure of the...
Method for packet authentication in the presence of network...
Method for parallel approval of an electronic document
Method for performing remote operations
Method for permanent decryption of selected sections of an...
Method for portability of information between multiple servers
Method for preventing a BIOS to get viruses
Method for preventing and detecting hash collisions of data...
Method for preventing counterfeiting of articles of manufacture
Method for preventing software piracy during installation...
Method for processing access-request message for packet service
Method for processing multiple security policies applied to...
Method for processing multiple wireless communications...
Method for producing certificate revocation lists
Method for producing certificate revocation lists
Method for prohibiting unauthorized access in a...
Method for protecting a security module and arrangement for...
Method for protecting executable software programs against infec
Method for protecting security accounts manager (SAM) files...
Method for protection against fraud in a network by icon...