Proofs of work and bread pudding protocols
Proofs of work and bread pudding protocols
Propagation of certificate revocation information
Propagation of viruses through an information technology...
Protected boot flow
Protected communication system
Protected dual purpose power/enter switch apparatus and method
Protected execution environments within a computer system
Protected IP telephony calls using encryption
Protected IP telephony calls using encryption
Protected platform identity for digital signing
Protected storage of a datum in an integrated circuit
Protected storage of core data secrets
Protected storage of core data secrets
Protectedly reading out an enciphered, cryptographic key
Protecting access to microcontroller memory blocks
Protecting against spoofed DNS messages
Protecting content from illicit reproduction by proof of...
Protecting content from illicit reproduction by proof of...
Protecting content from illicit reproduction by proof of...