Process and device for permitting selective access to a security
Process for administrating over changes to...
Process for authentication of smart cards, and device for use of
Process for authentication, by an outside medium, of a portable
Process for creating and managing at least one cryptographic...
Process for creating and managing at least one cryptographic...
Process for cryptographic key generation and safekeeping
Process for detecting unauthorized introduction of any data tran
Process for encrypted information transmission
Process for encrypting a fingerprint onto an I.D. card
Process for ensuring a securing interface between a telephone wi
Process for establishing a common cryptographic key for N...
Process for exchange of rights between microprocessor cards
Process for generating codes for CDMA communications, system...
Process for generating DSA signatures with low-cost portable app
Process for improving public key authentication
Process for loading a protected storage zone of an information p
Process for managing a symmetric key in a communication...
Process for managing a symmetric key in a communication...
Process for pledging data for a secure data exchange protocol