Return-to-LIBC attack detection using branch trace records...
Reverse engineering access control
Reverse firewall packet transmission control system
Revocation information management
RF firewall for a wireless network
RF firewall for a wireless network
RFID based network admission control
Rights elevator
Rights locker for digital content access control
Rights management inter-entity message policies and enforcement
Rights management inter-entity message policies and enforcement
Rights management terminal, server apparatus and usage...
Rights management using recording definition information (RDI)
Risk detection
Risk scoring system for the prevention of malware
Robust and flexible group structure
Robust visual passwords
Rogue access point detection in wireless networks
Role-based access using combinatorial inheritance and...
Role-based authorization management framework