Processing device and associated methodology for authorized...
Processing internet protocol security traffic
Processor, memory, computer system, and method of...
Program execution device and program execution method
Program use authorization method
Program, client authentication requesting method, server...
Prompt authentication
Prompt authentication
Propagating black hole shunts to remote routers with split...
Protected execution environments within a computer system
Protected execution environments within a computer system
Protected mutual authentication over an unsecured wireless...
Protecting against distributed denial of service attacks
Protecting against spoofed DNS messages
Protecting one-time-passwords against man-in-the-middle attacks
Protection against denial-of-service attacks
Protection of privacy data
Providing continuing service for a third-party network site...
Providing identity-related information and preventing...
Providing security for external access to a protected...