WO2009132046A2
|
|
Method and system for security requiring authorization by multiple users
|
AU2008275360A1
|
|
System and method for processing data for data security
|
EP2151084A1
|
|
System and method for controlled access key management
|
EP2140593A1
|
|
Method and system for identifying and managing encryption keys
|
US2009119358A1
|
|
Computational method, system, and apparatus
|
US2006136598A1
|
|
TCP/IP proxy utilizing transparent acknowledgements
|
US2005110399A1
|
|
Method and system for generating a cryptographically random number stream
|
GB0329039D0
|
|
Cryptographic security module method and apparatus
|
US2005078670A1
|
|
High-throughput state management for TCP
|
GB0317742D0
|
|
Secure transmission of data within a distributed computer system
|
GB0304663D0
|
|
A method and system of securely enforcing a computer policy
|
GB0220954D0
|
|
Security device
|
US2003018788A1
|
|
System and method for small-area system data processing
|
US7900042B2
|
|
Encrypted packet inspection
|
US2003219121A1
|
|
Biometric key generation for secure storage
|
US7233970B2
|
|
Computational method, system, and apparatus
|
US7913261B2
|
|
Application-specific information-processing method, system, and apparatus
|
US7218734B2
|
|
Ring arithmetic method, system, and apparatus
|
GB0123453D0
|
|
Time stamping device
|
GB0122169D0
|
|
Digital time stamping system
|