Obfuscating computer code to prevent an attack
Obfuscation of executable code
Object location based security using RFID
Object reference in a system
Oblivious proxying using a secure coprocessor
Oblivious proxying using a secure coprocessor
Obtaining digital identities or tokens through independent...
Obtaining network origins of potential software threats
Obtaining temporary exclusive control of a printing device
Off-line economies for digital media
Offline access in a document control system
Offline playback of advertising supported media
On connect security scan and delivery by a network security...
On-access malware scanning
On-access scan of memory for malware
On-box active reconnaissance
On-demand cleanup system
On-line centralized and local authorization of executable files
On-machine communication verification
On-machine communication verification