Restricted software and hardware usage on a computer
Return-to-LIBC attack blocking system and method
Return-to-LIBC attack detection using branch trace records...
Revocation information management
Rights locker for digital content access control
Rights management terminal, server apparatus and usage...
Rights management using recording definition information (RDI)
Role-based portal to a workplace system
Runtime modification of client user controls
Scheduled-recording method that schedules recording of...
Secure and granular index for information retrieval
Secure compact flash
Secure configuration of a wireless sensor network
Secure content activation during manufacture of mobile...
Secure content activation during manufacture of mobile...
Secure data exchange technique
Secure data exchange technique
Secure detection network system
Secure document-data-handling system and methodology
Secure document-data-handling system and methodology