Protecting decrypted compressed content and decrypted...
Protecting digital goods using oblivious checking
Protecting digital goods using oblivious checking
Protecting information in a system
Protecting mobile code against malicious hosts
Protecting mobile code against malicious hosts
Protecting mobile code against malicious hosts
Protecting privacy of networked devices containing...
Protecting resources in a distributed computer system
Protecting sensitive data associations
Protecting smart cards from power analysis with detachable...
Protecting software from unauthorized use by applying...
Protection domains to provide security in a computer system
Protection for customer programs (EPROM)
Protection of biometric data via key-dependent sampling
Protection of boot block code while allowing write accesses...
Protection of boot block data and accurate reporting of boot...
Protection of digital content using block cipher crytography
Protection of information transmitted over communications...
Protection of laptop computers from theft in the stream of...