Secure entry of a user-identifier in a publicly positioned...
Secure establishment of cryptographic keys using persistent...
Secure exchange of IP cores
Secure execution box
Secure execution environment by preventing execution of...
Secure execution mode exceptions
Secure execution of downloaded software
Secure execution of program code
Secure execution of program code
Secure file access control via directory encryption
Secure File Archive through encryption key management
Secure file system server architecture and methods
Secure file transfer system
Secure firewall supporting different levels of authentication ba
Secure flash-memory card reader with host-encrypted data on...
Secure gateway for analyzing textual content to identify a...
Secure gateway having user identification and password...
Secure gateway interconnection in an e-commerce based...
Secure gateway with redundent servers
Secure general purpose input/output pins for protecting computer