Apparatus and method for VPN communication in socket-level
Apparatus for monitoring network traffic
Apparatus, systems and methods to provide authentication...
Application-to-application security in enterprise security...
Approach for securely deploying network devices
Architecture and design for central authentication and...
Architecture for mobile IPv6 applications over IPv4
Architecture for virtual private networks
Arrangements for efficient authentication of service request...
Associative policy model
Attack defending system and attack defending method
Attestation key memory device and bus
Attribute level access control
Auditing authorization decisions
Auditing compliance with a hippocratic database
Auditing secret key cryptographic operations
Authentic device admission scheme for a secure communication...
Authenticated distributed detection and inference
Authenticated domain name resolution
Authenticated firewall tunneling framework