Hardened extensible firmware framework
Hardware protection
Hidden proactive replication of data
High security wireless key for asynchronous delivery drop boxes
Home network system and method therefor
Host certification method and system
Hybrid role-based discretionary access control
IC card and access control method
Identification card manufacturing security
Identifying dependencies of an application upon a given...
Identifying the origin of hard-copy documents
Image capture apparatus
Image forming device, computer program, and data file
Image processing apparatus and image forming apparatus
Image processing apparatus, image processing method,...
Image processing device, document data transmission method,...
Image verification
In memory heuristic system and method for detecting viruses
Information data and management data processing apparatus...
Information managing apparatus and method, recording medium,...