Techniques for performing malware scanning of files stored...
Techniques for performing UMTS (universal mobile...
Techniques for performing UMTS (Universal Mobile...
Techniques for permitting access across a context barrier on...
Techniques for presenting network identities at a human...
Techniques for preventing attacks on computer systems and...
Techniques for providing verifiable security in storage devices
Techniques for secure transparent switching between modes of...
Techniques for securely accelerating external domains locally
Techniques for securely managing and accelerating data delivery
Techniques for self-isolation of networked devices
Techniques for storing and retrieving security information...
Techniques for variable security access information
Techniques to pollute electronic profiling
Teleconference system, on-site server, management server,...
Television receiver and electronic device
Terminal control apparatus and terminal control method
Terminal device and computer readable medium
Terminal device, information storage medium, and data...
Test access control for secure integrated circuits