Protection of processes running in a computer system
Protection of secure electronic modules against attacks
Protection of software again against unauthorized use
Protection of software using a challenge-response protocol...
Protection of the configuration of modules in computing...
Protection of the core part of computer against external...
Protection of the distribution of digital documents in a...
Protective relay with embedded web server
Protocol and interface between a LAN on motherboard (LOM)...
Protocol for synchronizing parallel processors in a mobile...
Protocol for trusted platform module recovery through...
Protocol scripting language for safe execution in embedded...
Protocol-level malware scanner
Protocols for anonymous electronic communication and...
Providing a configuration file to a communication device
Providing a low-power state processor voltage in accordance...
Providing a pre-boot driver for use during operating system...
Providing a protected volume on a data storage device
Providing a trusted platform module in a hypervisor environment
Providing a user input interface prior to initiation of an...