Method for transmitting superimposed image data in a radio frequ
Method for undetectably impeding key strength of encryption...
Method for updating a communication unit parameter in a wireless
Method for updating a network ciphering key
Method for updating encryption key information in communication
Method for updating encryption key information in communication
Method for user identity protection
Method for using an access card to create a secure...
Method for utilizing an encrypted key as a key identifier in a d
Method for utilizing medium nonuniformities to minimize unauthor
Method for verifying an identification card and recording verifi
Method for verifying digital franking notes
Method for verifying the configuration the computer system
Method for verifying the expected postage security device...
Method for verifying the use of public keys generated by an...
Method for video editing
Method for XZ-elliptic curve cryptography
Method for XZ-elliptic curve cryptography
Method of a public key encryption and a cypher communication...
Method of adaptive control of the presence of a copy...