Programmable data bus
Programmable processor supporting secure mode
Programmable security platform
Projector projecting password
Proof of execution using random function
Proofs of work and bread pudding protocols
Proofs of work and bread pudding protocols
Propagation of certificate revocation information
Protected communication system
Protected execution environments within a computer system
Protected IP telephony calls using encryption
Protected IP telephony calls using encryption
Protected platform identity for digital signing
Protected storage of core data secrets
Protectedly reading out an enciphered, cryptographic key
Protecting access to microcontroller memory blocks
Protecting against spoofed DNS messages
Protecting content from illicit reproduction by proof of...
Protecting content from illicit reproduction by proof of...
Protecting content from illicit reproduction by proof of...