Controlling access to network resources
Controlling movement of owned parts
Conversion of television signal formats with retention of common
Cooperative encoding of data by pluralities of parties
Copy protection of data
Cordless phone system capable of scrambling communication signal
Counterfeit proof ID card having a scrambled facial image
Counterfeit-proof identification card
Countermeasure method in an electric component implementing...
Countermeasure method in an electronic component using a...
Countermeasure method in an electronic component which uses...
Countermeasure procedures in an electronic component...
Crypotographic key version control facility
Crypt key system
Cryptical control method for personal communication
Cryptographic accelerator
Cryptographic accelerator
Cryptographic apparatus with double feedforward hash function
Cryptographic authentication of transmitted messages using pseud
Cryptographic authentication of transmitted messages using pseud