Method for personalization of an active card
Method for point-to-point communications within secure communica
Method for preventing inadvertent betrayal by a trustee of escro
Method for processing a digital signal in a so-called secure com
Method for producing a common key in two devices, in order to im
Method for protectedly debiting an electronic payment means
Method for providing blind access to an encryption key
Method for providing information security by exchanging authenti
Method for providing limited secure services in secure trunking
Method for providing location certificates
Method for providing mutual authentication of a user and a serve
Method for providing notification of classified electronic messa
Method for providing secure remote command execution over an ins
Method for providing video programming nearly on demand
Method for proving the authenticity or integrity of a...
Method for recovering from encryption key variable loss
Method for reducing a value modulo a shared secret
Method for scrambling and/or descrambling FM subcarrier data
Method for secure communication
Method for secure communications in a telecommunications system