Method for performing a transaction over a network
Method for preventing unauthorized access to information...
Method for protecting a microcomputer system against...
Method for protecting data in a hard disk
Method for protecting digital content from unauthorized use...
Method for protecting memory proprietary commands
Method for providing security mechanisms for data...
Method for providing temporary access to a commonly...
Method for retransmission of use authorization information
Method for scanning protected components of electronic messages
Method for secured access to data in a network
Method for securely loading and executing software in a...
Method for securely managing information in database
Method for securely managing information in database
Method for securing and controlling USB ports
Method for vehicle internetworks
Method of assessing an organization's network identity...
Method of authorising a computing entity
Method of controlling access for software development via a...
Method of controlling recording of media