Detecting stolen authentication cookie attacks
Detection of encrypted packet streams using feedback probing
Detection of polymorphic virus code using dataflow analysis
Determining roles for automated tasks in a role-based access...
Determining whether to grant access to a passcode protected...
Device and process for unique internet access identification
Device authentication
Device authentication management system
Device control apparatus
Device control system
Device control system
Device in a system operating with CAN-protocol and in a...
Device independent authentication system and method
Device management system, management client, controller...
Device ownership transfer from a network
Device registration system and device registration apparatus
Device, method and program for detecting unauthorized access
Device, method and program for providing matching service
Device, system, and method for capturing email borne viruses
Digital asset distribution system