Procedure for monitoring the integrity of a physical object
DE102018131084A1
Procedures to ensure the trustworthiness of source codes
DE102018111081A1
Method for securing a data exchange in a distributed infrastructure
DE102017109424A1
Method for secure access to data
DE102017103519A1
Method for secure access to data
DE102015114544A1
Method for secure and efficient access to connection data
DE102015110190A1
Data processing device and method for operating the same
DE102014101710A1
Method and system for backing up database relations against unauthorized access
DE102013112341A1
System and method for securing telecommunications traffic data
DE102013105950A1
A method for securely operating an encrypted connection between a client system and a server system
DE102013105740A1
System and method for securing telecommunications traffic data
DE102012103532A1
Method for encrypting telecommunication connection data for secure access to data, involves transferring generated double encrypted data for storage in storage device located outside secured area
DE102010043392A1
Method for generating virtual net gear for data protection, involves assigning analog-implemented pseudonym to virtual network supporters, via conduct of user's actions of virtual net gear in network