Secure terminal provided with a smart card reader designed...
Secure transparent virtual private networks
Secure transparent virtual private networks
Secure transport for mobile communication network
Secure transport for mobile communication network
Secure traversal of network components
Secure web access via an original CD
Secured communication channel between IT administrators...
Secured FTP architecture
Secured virtual network in a gaming environment
Securely calling web services from macros
Securely propagating authentication in an ensemble of...
Securely roaming digital identities
Securely roaming digital identities
Securing non-EJB corba objects using an EJB security mechanism
Securing uniform resource identifier namespaces
Security and authorization in management agents
Security and communications module
Security architecture for integration of enterprise...
Security device, terminal device, gate device, and device