Method for correcting subscriber-based secure call keys
Method for countermeasure in an electronic component using a...
Method for creating communities of trust in a secure...
Method for data decorrelation
Method for data encryption in an ethernet passive optical...
Method for data encryption in an ethernet passive optical...
Method for data security in a digital telecommunication system
Method for delegating authorization from one entity to another t
Method for dial-in access security using a multimedia modem
Method for dynamically updating cellular phone unique encryption
Method for efficient management of certificate revocation lists
Method for electronic merchandise dispute resolution
Method for electronic payment system with issuer control
Method for electronic transaction with digital signature
Method for elliptic curve point multiplication
Method for elliptic curve scalar multiplication
Method for enabling users of a cryptosystem to generate and use
Method for encrypting and decrypting data using chaotic maps
Method for encrypting and decrypting data using derivative...
Method for encrypting and decrypting data using derivative...