Search
Selected: S

Security key distribution using key rollover strategies for...

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Sharing a secret using hyperplanes over GF(2 m )

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Sharing a secret using hyperplanes over GF(q)

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Short term internet access

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Signing and signature authentication of messages

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Simplified addressing for private communications

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Software distribution system and software utilization scheme...

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Spatial key trees for key management in wireless environments

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Split-key key-agreement protocol

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for controlling disclosure time of...

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for distributed security

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for encryption key generation

Cryptography – Key management – Key distribution
Patent

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for generalized authentication

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for key distribution in a hierarchical tree

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for secure replacement of high level...

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for secure three-party communications

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for securely upgrading firmware

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for securing calls between endpoints

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for sending encrypted messages to a...

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

System and method for the concealment of device input...

Cryptography – Key management – Key distribution
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.