Derivation and quantization of robust non-local...
Derivation and quantization of robust non-local...
DES encryption system
Detachable I/O device for computer data security
Detecting collusion among multiple recipients of...
Detecting malicious alteration of stored computer files
Detecting malicious software by analyzing patterns of system...
Detection and elimination of macro viruses
Detection and identification methods for software
Detection method of illegal access to computer system
Detection of a digital data fingerprint
Detection of an attack such as a pre-attack on a computer...
Detection of computer viruses spanning multiple data streams
Detection of frequent and dispersed invariants
Detection of support for security protocol and address...
Determination of a best offset to detect an embedded pattern
Determining point of interaction device security properties...
Determining the reputation of a sender of communications
Determining theft of grammar code
Deterministic user authentication service for communication netw