Protecting decrypted compressed content and decrypted...
Protecting information in a system
Protecting privacy of networked devices containing...
Protecting resources in a distributed computer system
Protecting smart cards from power analysis with detachable...
Protecting software from unauthorized use by applying...
Protection domains to provide security in a computer system
Protection of biometric data via key-dependent sampling
Protection of information transmitted over communications...
Protection of laptop computers from theft in the stream of...
Protection of the core part of computer against external...
Protection of the distribution of digital documents in a...
Protocol-level malware scanner
Protocols for anonymous electronic communication and...
Providing a configuration file to a communication device
Providing a trusted platform module in a hypervisor environment
Providing apparatus, providing method, communication device,...
Providing break points in a malware scanning operation
Providing certificate matching in a system and method for...
Providing end-to-end user authentication for host access...