Disabling tool execution via roles
Discovering stolen or lost network-attachable computer systems
Discovery and authentication scheme for wireless mesh networks
Discrete, background determination of the adequacy of...
Disk drive comprising encryption circuitry selectively...
Disk drive, control method thereof and disk-falsification...
Disk recording medium, reproduction device and method for...
Display control apparatus and method
Display of decrypted data by a graphics processing unit
Display unit storing and using a cryptography key
Displaying a security element with a browser window
Displaying a security element with a browser window
Distributed authentication mechanisms for handling diverse...
Distributed computing architecture
Distributed control of integrity measurement using a trusted...
Distributed cryptographic methods and arrangements
Distributed digital signature generation method and...
Distributed dynamic security capabilities
Distributed filesystem network security extension
Distributed filtering and monitoring system for a computer...