Scheme for device and user authentication with key...
Scheme for device and user authentication with key...
Scheme for sub-realms within an authentication protocol
Scheme, system and equipment for inter-equipment...
Scoped federations
Scrambled information transmitting and receiving method
Scrambling of image by randomizing pixel values
Screen saver displaying identity content
SCSI clock stretching
SCSI phase specific bus reset generator
Sealing of data for applications
Seamless computer system remote control
Seamless data migration
Seamless integration of application programs with security...
Search engine and digital rights management
Second operation in internal peripheral circuit (IPC)...
Secrecy communication system
Secret code security access to data processing means
Secret data storage device, secret data reading method, and cont
Secret information protection system