AU2001269794A1 - Method and apparatus for enhancing network security protection server performance - Google Patents
Method and apparatus for enhancing network security protection server performanceInfo
- Publication number
- AU2001269794A1 AU2001269794A1 AU2001269794A AU6979401A AU2001269794A1 AU 2001269794 A1 AU2001269794 A1 AU 2001269794A1 AU 2001269794 A AU2001269794 A AU 2001269794A AU 6979401 A AU6979401 A AU 6979401A AU 2001269794 A1 AU2001269794 A1 AU 2001269794A1
- Authority
- AU
- Australia
- Prior art keywords
- network security
- security protection
- server performance
- protection server
- enhancing network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/721—Modular inversion, reciprocal or quotient calculation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US21103100P | 2000-06-12 | 2000-06-12 | |
US21102300P | 2000-06-12 | 2000-06-12 | |
US60/211,031 | 2000-06-12 | ||
US60/211,023 | 2000-06-12 | ||
USNOTGIVEN | 2000-12-18 | ||
US09/877,302 US20020039420A1 (en) | 2000-06-12 | 2001-06-08 | Method and apparatus for batched network security protection server performance |
PCT/US2001/018878 WO2001097443A2 (en) | 2000-06-12 | 2001-06-12 | Method and apparatus for enhancing network security protection server performance |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2001269794A1 true AU2001269794A1 (en) | 2001-12-24 |
Family
ID=27395582
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001269794A Abandoned AU2001269794A1 (en) | 2000-06-12 | 2001-06-12 | Method and apparatus for enhancing network security protection server performance |
AU2001268325A Abandoned AU2001268325A1 (en) | 2000-06-12 | 2001-06-12 | Method and apparatus for batched network security protection server performance |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001268325A Abandoned AU2001268325A1 (en) | 2000-06-12 | 2001-06-12 | Method and apparatus for batched network security protection server performance |
Country Status (3)
Country | Link |
---|---|
US (1) | US20020039420A1 (en) |
AU (2) | AU2001269794A1 (en) |
WO (2) | WO2001097442A2 (en) |
Families Citing this family (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7509486B1 (en) * | 1999-07-08 | 2009-03-24 | Broadcom Corporation | Encryption processor for performing accelerated computations to establish secure network sessions connections |
US20020087884A1 (en) * | 2000-06-12 | 2002-07-04 | Hovav Shacham | Method and apparatus for enhancing network security protection server performance |
US20040015725A1 (en) * | 2000-08-07 | 2004-01-22 | Dan Boneh | Client-side inspection and processing of secure content |
US7137143B2 (en) | 2000-08-07 | 2006-11-14 | Ingrian Systems Inc. | Method and system for caching secure web content |
US7757278B2 (en) * | 2001-01-04 | 2010-07-13 | Safenet, Inc. | Method and apparatus for transparent encryption |
WO2004019182A2 (en) * | 2002-08-24 | 2004-03-04 | Ingrian Networks, Inc. | Selective feature activation |
US20060149962A1 (en) * | 2003-07-11 | 2006-07-06 | Ingrian Networks, Inc. | Network attached encryption |
DE602005017750D1 (en) * | 2004-03-04 | 2009-12-31 | Nxp Bv | METHOD FOR EXPONENTING OR SCALAR MULTIPLICING MULTIPLE ELEMENTS |
US7519835B2 (en) * | 2004-05-20 | 2009-04-14 | Safenet, Inc. | Encrypted table indexes and searching encrypted tables |
JP4162237B2 (en) * | 2004-06-24 | 2008-10-08 | インターナショナル・ビジネス・マシーンズ・コーポレーション | ENCRYPTED COMMUNICATION SYSTEM, ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, ENCRYPTION PROGRAM, AND DECRYPTION PROGRAM |
US20070180228A1 (en) * | 2005-02-18 | 2007-08-02 | Ulf Mattsson | Dynamic loading of hardware security modules |
US20070038703A1 (en) * | 2005-07-14 | 2007-02-15 | Yahoo! Inc. | Content router gateway |
US7623515B2 (en) * | 2005-07-14 | 2009-11-24 | Yahoo! Inc. | Content router notification |
US20070016636A1 (en) * | 2005-07-14 | 2007-01-18 | Yahoo! Inc. | Methods and systems for data transfer and notification mechanisms |
US20070014277A1 (en) * | 2005-07-14 | 2007-01-18 | Yahoo! Inc. | Content router repository |
US7849199B2 (en) * | 2005-07-14 | 2010-12-07 | Yahoo ! Inc. | Content router |
US20070014307A1 (en) * | 2005-07-14 | 2007-01-18 | Yahoo! Inc. | Content router forwarding |
US7631045B2 (en) * | 2005-07-14 | 2009-12-08 | Yahoo! Inc. | Content router asynchronous exchange |
US20070079386A1 (en) * | 2005-09-26 | 2007-04-05 | Brian Metzger | Transparent encryption using secure encryption device |
US20070079140A1 (en) * | 2005-09-26 | 2007-04-05 | Brian Metzger | Data migration |
US7725927B2 (en) * | 2005-10-28 | 2010-05-25 | Yahoo! Inc. | Low code-footprint security solution |
US8024290B2 (en) | 2005-11-14 | 2011-09-20 | Yahoo! Inc. | Data synchronization and device handling |
US8065680B2 (en) * | 2005-11-15 | 2011-11-22 | Yahoo! Inc. | Data gateway for jobs management based on a persistent job table and a server table |
US9367832B2 (en) * | 2006-01-04 | 2016-06-14 | Yahoo! Inc. | Synchronizing image data among applications and devices |
US7848516B2 (en) * | 2006-01-20 | 2010-12-07 | Chiou-Haun Lee | Diffused symmetric encryption/decryption method with asymmetric keys |
US8386768B2 (en) * | 2006-02-08 | 2013-02-26 | Safenet, Inc. | High performance data encryption server and method for transparently encrypting/decrypting data |
US7958091B2 (en) | 2006-02-16 | 2011-06-07 | Ingrian Networks, Inc. | Method for fast bulk loading data into a database while bypassing exit routines |
US20080034008A1 (en) * | 2006-08-03 | 2008-02-07 | Yahoo! Inc. | User side database |
US8144875B2 (en) * | 2006-09-06 | 2012-03-27 | Paul McGough | Method and system for establishing real-time authenticated and secured communications channels in a public network |
US8379865B2 (en) * | 2006-10-27 | 2013-02-19 | Safenet, Inc. | Multikey support for multiple office system |
US8549122B2 (en) * | 2006-12-04 | 2013-10-01 | Oracle International Corporation | System and method for communication agent within a fully distributed network |
US20080270629A1 (en) * | 2007-04-27 | 2008-10-30 | Yahoo! Inc. | Data snychronization and device handling using sequence numbers |
US20100031321A1 (en) | 2007-06-11 | 2010-02-04 | Protegrity Corporation | Method and system for preventing impersonation of computer system user |
US20090132804A1 (en) * | 2007-11-21 | 2009-05-21 | Prabir Paul | Secured live software migration |
US7978854B2 (en) * | 2008-03-25 | 2011-07-12 | International Business Machines Corporation | Asymmetric key generation |
EP2222013A1 (en) * | 2009-02-19 | 2010-08-25 | Thomson Licensing | Method and device for countering fault attacks |
US8638926B2 (en) * | 2009-02-26 | 2014-01-28 | Red Hat, Inc. | Sharing a secret with modular inverses |
CN105164634A (en) | 2013-03-29 | 2015-12-16 | 惠普发展公司,有限责任合伙企业 | Batching tuples |
US9112908B2 (en) | 2013-05-31 | 2015-08-18 | International Business Machines Corporation | System and method for managing TLS connections among separate applications within a network of computing systems |
US9112907B2 (en) | 2013-05-31 | 2015-08-18 | International Business Machines Corporation | System and method for managing TLS connections among separate applications within a network of computing systems |
JP6262085B2 (en) * | 2014-06-25 | 2018-01-17 | ルネサスエレクトロニクス株式会社 | Data processing apparatus and decryption processing method |
FR3088452B1 (en) * | 2018-11-08 | 2023-01-06 | Idemia France | METHOD FOR VERIFYING THE INTEGRITY OF A PAIR OF CRYPTOGRAPHIC KEYS AND CRYPTOGRAPHIC DEVICE |
US11533603B2 (en) * | 2019-10-14 | 2022-12-20 | Qualcomm Incorporated | Power saving for pedestrian user equipments |
US11151071B1 (en) * | 2020-05-27 | 2021-10-19 | EMC IP Holding Company LLC | Host device with multi-path layer distribution of input-output operations across storage caches |
CN115766263B (en) * | 2022-11-25 | 2024-05-03 | 深圳泓川科技有限公司 | Multidimensional electric power data privacy protection aggregation method and system based on cloud and fog calculation |
Family Cites Families (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4386416A (en) * | 1980-06-02 | 1983-05-31 | Mostek Corporation | Data compression, encryption, and in-line transmission system |
US4964164A (en) * | 1989-08-07 | 1990-10-16 | Algorithmic Research, Ltd. | RSA computation method for efficient batch processing |
US5222133A (en) * | 1991-10-17 | 1993-06-22 | Wayne W. Chou | Method of protecting computer software from unauthorized execution using multiple keys |
JP3082554B2 (en) * | 1994-01-11 | 2000-08-28 | 株式会社日立製作所 | Self healing ring switch |
US5557712A (en) * | 1994-02-16 | 1996-09-17 | Apple Computer, Inc. | Color map tables smoothing in a color computer graphics system avoiding objectionable color shifts |
US5734744A (en) * | 1995-06-07 | 1998-03-31 | Pixar | Method and apparatus for compression and decompression of color data |
US5764235A (en) * | 1996-03-25 | 1998-06-09 | Insight Development Corporation | Computer implemented method and system for transmitting graphical images from server to client at user selectable resolution |
US5828832A (en) * | 1996-07-30 | 1998-10-27 | Itt Industries, Inc. | Mixed enclave operation in a computer network with multi-level network security |
JP3695045B2 (en) * | 1996-10-01 | 2005-09-14 | ソニー株式会社 | Encoder |
US6098096A (en) * | 1996-12-09 | 2000-08-01 | Sun Microsystems, Inc. | Method and apparatus for dynamic cache preloading across a network |
US5848159A (en) * | 1996-12-09 | 1998-12-08 | Tandem Computers, Incorporated | Public key cryptographic apparatus and method |
US5923756A (en) * | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US6061448A (en) * | 1997-04-01 | 2000-05-09 | Tumbleweed Communications Corp. | Method and system for dynamic server document encryption |
US6012198A (en) * | 1997-04-11 | 2000-01-11 | Wagner Spray Tech Corporation | Painting apparatus |
US6105012A (en) * | 1997-04-22 | 2000-08-15 | Sun Microsystems, Inc. | Security system and method for financial institution server and client web browser |
US6397330B1 (en) * | 1997-06-30 | 2002-05-28 | Taher Elgamal | Cryptographic policy filters and policy control method and apparatus |
US6256712B1 (en) * | 1997-08-01 | 2001-07-03 | International Business Machines Corporation | Scaleable method for maintaining and making consistent updates to caches |
US6490620B1 (en) * | 1997-09-26 | 2002-12-03 | Worldcom, Inc. | Integrated proxy interface for web based broadband telecommunications management |
US6621505B1 (en) * | 1997-09-30 | 2003-09-16 | Journee Software Corp. | Dynamic process-based enterprise computing system and method |
US6081598A (en) * | 1997-10-20 | 2000-06-27 | Microsoft Corporation | Cryptographic system and method with fast decryption |
US6202157B1 (en) * | 1997-12-08 | 2001-03-13 | Entrust Technologies Limited | Computer network security system and method having unilateral enforceable security policy provision |
US6154542A (en) * | 1997-12-17 | 2000-11-28 | Apple Computer, Inc. | Method and apparatus for simultaneously encrypting and compressing data |
US6233565B1 (en) * | 1998-02-13 | 2001-05-15 | Saranac Software, Inc. | Methods and apparatus for internet based financial transactions with evidence of payment |
US6073242A (en) * | 1998-03-19 | 2000-06-06 | Agorics, Inc. | Electronic authority server |
CA2267721C (en) * | 1998-03-26 | 2002-07-30 | Nippon Telegraph And Telephone Corporation | Scheme for fast realization of encryption, decryption and authentication |
US6578061B1 (en) * | 1999-01-19 | 2003-06-10 | Nippon Telegraph And Telephone Corporation | Method and apparatus for data permutation/division and recording medium with data permutation/division program recorded thereon |
US6081900A (en) * | 1999-03-16 | 2000-06-27 | Novell, Inc. | Secure intranet access |
US6594279B1 (en) * | 1999-04-22 | 2003-07-15 | Nortel Networks Limited | Method and apparatus for transporting IP datagrams over synchronous optical networks at guaranteed quality of service |
US6886095B1 (en) * | 1999-05-21 | 2005-04-26 | International Business Machines Corporation | Method and apparatus for efficiently initializing secure communications among wireless devices |
US6477646B1 (en) * | 1999-07-08 | 2002-11-05 | Broadcom Corporation | Security chip architecture and implementations for cryptography acceleration |
US6757823B1 (en) * | 1999-07-27 | 2004-06-29 | Nortel Networks Limited | System and method for enabling secure connections for H.323 VoIP calls |
US6654354B1 (en) * | 1999-12-22 | 2003-11-25 | Worldcom, Inc. | System and method for planning multiple MUX levels in a fiber optic network simulation plan |
US6616350B1 (en) * | 1999-12-23 | 2003-09-09 | Nortel Networks Limited | Method and apparatus for providing a more efficient use of the total bandwidth capacity in a synchronous optical network |
US6587866B1 (en) * | 2000-01-10 | 2003-07-01 | Sun Microsystems, Inc. | Method for distributing packets to server nodes using network client affinity and packet distribution table |
US6763459B1 (en) * | 2000-01-14 | 2004-07-13 | Hewlett-Packard Company, L.P. | Lightweight public key infrastructure employing disposable certificates |
US20020087884A1 (en) * | 2000-06-12 | 2002-07-04 | Hovav Shacham | Method and apparatus for enhancing network security protection server performance |
CA2415888C (en) * | 2000-08-04 | 2008-10-21 | Avaya Technology Corporation | Intelligent demand driven recognition of url objects in connection oriented transactions |
US7137143B2 (en) * | 2000-08-07 | 2006-11-14 | Ingrian Systems Inc. | Method and system for caching secure web content |
US20040015725A1 (en) * | 2000-08-07 | 2004-01-22 | Dan Boneh | Client-side inspection and processing of secure content |
WO2002025438A1 (en) * | 2000-09-22 | 2002-03-28 | Patchlink.Com Corporation | Non-invasive automatic offsite patch fingerprinting and updating system and method |
US6963980B1 (en) * | 2000-11-16 | 2005-11-08 | Protegrity Corporation | Combined hardware and software based encryption of databases |
US20020066038A1 (en) * | 2000-11-29 | 2002-05-30 | Ulf Mattsson | Method and a system for preventing impersonation of a database user |
US7757278B2 (en) * | 2001-01-04 | 2010-07-13 | Safenet, Inc. | Method and apparatus for transparent encryption |
US20030065919A1 (en) * | 2001-04-18 | 2003-04-03 | Albert Roy David | Method and system for identifying a replay attack by an access device to a computer system |
US7853781B2 (en) * | 2001-07-06 | 2010-12-14 | Juniper Networks, Inc. | Load balancing secure sockets layer accelerator |
US20030097428A1 (en) * | 2001-10-26 | 2003-05-22 | Kambiz Afkhami | Internet server appliance platform with flexible integrated suite of server resources and content delivery capabilities supporting continuous data flow demands and bursty demands |
ATE375567T1 (en) * | 2001-11-23 | 2007-10-15 | Protegrity Res & Dev | METHOD FOR DETECTING INTRUDERS IN A DATABASE SYSTEM |
US7269729B2 (en) * | 2001-12-28 | 2007-09-11 | International Business Machines Corporation | Relational database management encryption system |
US7742992B2 (en) * | 2002-02-05 | 2010-06-22 | Pace Anti-Piracy | Delivery of a secure software license for a software product and a toolset for creating the software product |
US6874089B2 (en) * | 2002-02-25 | 2005-03-29 | Network Resonance, Inc. | System, method and computer program product for guaranteeing electronic transactions |
US6694323B2 (en) * | 2002-04-25 | 2004-02-17 | Sybase, Inc. | System and methodology for providing compact B-Tree |
US6782000B2 (en) * | 2002-10-31 | 2004-08-24 | Ciena Corporation | Method, system and storage medium for providing a cross connect user interface |
-
2001
- 2001-06-08 US US09/877,302 patent/US20020039420A1/en not_active Abandoned
- 2001-06-12 WO PCT/US2001/018825 patent/WO2001097442A2/en active Application Filing
- 2001-06-12 AU AU2001269794A patent/AU2001269794A1/en not_active Abandoned
- 2001-06-12 AU AU2001268325A patent/AU2001268325A1/en not_active Abandoned
- 2001-06-12 WO PCT/US2001/018878 patent/WO2001097443A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2001097442A2 (en) | 2001-12-20 |
WO2001097442A3 (en) | 2003-02-06 |
WO2001097443A3 (en) | 2003-05-08 |
WO2001097443A2 (en) | 2001-12-20 |
AU2001268325A1 (en) | 2001-12-24 |
US20020039420A1 (en) | 2002-04-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001269794A1 (en) | Method and apparatus for enhancing network security protection server performance | |
AU2002322109A1 (en) | Method and apparatus for distributed network security | |
AU2001268408A1 (en) | Method and device for network security monitoring | |
AU2002344308A1 (en) | Method and system for implementing security devices in a network | |
AU3640799A (en) | Apparatus and method for trusted network security | |
AU2002230388A1 (en) | Method and apparatus for encrypted communications to a secure server | |
AU2002239249A1 (en) | System and method for secure network mobility | |
AU2001294084A1 (en) | A method and an apparatus for a security policy | |
AU2001257374A1 (en) | Network management method and system | |
AU5245201A (en) | System and method for highly secure data communications | |
WO2002079949A3 (en) | Internet security system | |
AU2001231106A1 (en) | Network portal system, apparatus and method | |
AU2001231060A1 (en) | System and method for facilitating secure payment with privacy over a computer network including the internet | |
AU2904701A (en) | Method and apparatus for network deception/emulation | |
AU2001286717A1 (en) | Method and apparatus for providing network dependent application services | |
AU2001292685A1 (en) | System and method for delivering security services | |
AU2001252067A1 (en) | Method and system for protection against denial of service attacks | |
AU2001255698A1 (en) | Network enabled application software system and method | |
AU2001281401A1 (en) | Systems and methods for distributed network protection | |
AU4833300A (en) | Apparatus and methods for analyzing multiple network security vulnerabilities | |
AU2003217021A1 (en) | Method and apparatus for network security | |
AU2001269870A1 (en) | System and method for security policy | |
AU2003219300A1 (en) | Method and apparatus for network security | |
EP1182533A3 (en) | Apparatus, system and method for enhancing data security | |
AU2001265207A1 (en) | Systems and methods for distributed network protection |