Using dynamic web components to remotely control the...
Using dynamic web components to remotely control the...
Using mobility tokens to observe malicious mobile code
Using multiple thermal points to enable component level...
Using multiple watermarks to protect content material
Using non-lossless compression to save power
Using protected/hidden region of a magnetic media under...
Using protected/hidden region of a magnetic media under...
Using request and grant signals to read revision information...
Using RTC wake-up to enable recovery from power failures
Using smartcards or other cryptographic modules for enabling...
Using SYN-ACK cookies within a TCP/IP protocol
Using system configuration data to customize bios during the...
Using TCP to authenticate IP source addresses
Using time to determine a hash extension
Using token-based signing to install unsigned binaries
Using trusted communication channel to combat user...
Using unpredictable information to minimize leakage from...
Using voice over IP or instant messaging to connect to...
Using watermarking to reduce communication overhead