Authenticated ID-based cryptosystem with no key escrow
Authenticating or signature method with reduced computations
Authenticating or signature method with reduced computations
Authenticating pseudo-random code and apparatus
Authenticating remote users in a distributed environment
Authenticating the identity of an authorized person
Authentication algorithms for video images
Authentication algorithms for video images
Authentication engine architecture and method
Authentication engine architecture and method
Authentication for analog communication systems
Authentication key management system and method
Authentication key management system and method
Authentication method and communication terminal and communicati
Authentication method and schemes for data integrity protection
Authentication method and system
Authentication method and system with a smartcard
Authentication method for keyless entry system
Authentication method for media gateway
Authentication method for mobile communications