Prompt authentication
Propagating black hole shunts to remote routers with split...
Propagation of viruses through an information technology...
Propagation of viruses through an information technology...
Propagation of viruses through an information technology...
Proprietary portable audio player system for protecting...
Protected execution environments within a computer system
Protected execution environments within a computer system
Protected media path and refusal response enabler
Protected media path and refusal response enabler
Protected mutual authentication over an unsecured wireless...
Protecting a computer coupled to a network from malicious...
Protecting a computer coupled to a network from malicious...
Protecting a computer that provides a Web service from malware
Protecting a data processing system from attack by a vandal...
Protecting a service provider from abuse
Protecting against distributed denial of service attacks
Protecting against software piracy
Protecting against spoofed DNS messages
Protecting computer users from online frauds