Key-based protection method for light-readable discs
Key-based secure network user states
Keyboard motion detector
Keyed authentication rollover for routers
Keyless encryption of messages using challenge response
Keytote component
Laddered authentication security using split key asymmetric...
LAN that allows non-authenticated external terminal station...
LDAP user authentication
Leak-resistant cryptographic method and apparatus
Least privilege via restricted tokens
Legacy access control security system modernization apparatus
Level-based network access restriction
License management system and method
License-based cryptographic technique particularly suited...
License-based cryptographic technique, particularly suited...
Licensee notification system
LIFM algorithm for security association database lookup in...
Light weight security for parallel access to multiple mirror...
Lightweight authentication system and method for validating...