Chaining information card selectors
Challenge-response user authentication
Changing code execution path using kernel mode redirection
Changing states of communication links in computer networks...
Character information generating apparatus and method,...
Characterizing computer attackers
Charging via policy enforcement
Child identity monitor
Child identity monitor
Chip attack protection
Circuit arrangement and method for protecting electronic...
Classification of software on networked systems
Client apparatus, server apparatus and authority control method
Client architecture for portable device with security policies
Client compliancy with self-policing clients
Client security for networked applications
Client-side security management for an operations,...
Client-side technique for detecting software robots
Cloaked data objects in an electronic content management...
Cloud-based application whitelisting