Search
Selected: All

Automatic generation of a new encryption key

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Automatic re-authentication

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Automatic sharing of whitelist data

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Automatically configuring a computer firewall based on...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Automatically generating rules for connection security

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Bearer control of encrypted data flows in packet data...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Behavior-based host-based intrusion prevention system

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Biometric authentication with security against eavesdropping

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

BIOS integrated encryption

Information security – Access control or authentication – Stand-alone
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Blocking of spam e-mail at a firewall

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Bluetooth™ based security system

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Bridged cryptographic VLAN

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Browser security notification

Information security – Access control or authentication – Stand-alone
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

CA in a card

Information security – Access control or authentication – Stand-alone
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cable installation support and management system

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cache techniques for URL rating

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Calculation of identifier codes distributed among pan devices

Information security – Access control or authentication – Authorization
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Card settlement method and system using mobile information...

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Card settlement method and system using mobile information...

Information security – Access control or authentication
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cardspace history validator

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.