Optimization methods for the insertion, protection, and...
Optimization methods for the insertion, protection, and...
Optimization methods for the insertion, protection, and...
Optimization methods for the insertion, protection, and...
Optimized security functionality in an electronic system
Optimizing costs associated with managing encrypted data
Out-of-band tokens for rights access
Out-of-band tokens for rights access
Outside access to computer resources through a firewall
Outside access to computer resources through a firewall
Overridable data protection mechanism for PLDs
Ownership tag on power-up screen
Packet authentication and packet encryption/decryption scheme fo
Packet authentication and packet encryption/decryption...
Packet communication system
Packet flooding defense system
Packet inspection device, mobile computer and packet transfer me
Packet processing device and mobile computer with reduced...
Packet Processor
Packet transmission/reception device