“J” system for securing a portable computer...
802.11 using a compressed reassociation exchange to...
ABDS method and verification status for authenticating...
ABDS system and verification status for authenticating...
ABDS system utilizing security information in authenticating...
Accelerated signature verification on a elliptic curve
Accelerated signature verification on an elliptic curve
Access and storage of secure group communication...
Access and storage of secure group communication...
Access authorization device for controlling access requested...
Access control and authorization system
Access control for computers
Access control module for a personal computer
Access control password generated as a function of random number
Access control system and method using hierarchical arrangement
Access control systems
Access control through secure channel using personal...
Access control using attributes contained within public key...
Access key codes for computer resources
Access privilege authentication of client computer for...