Enhanced method for digital data hiding
Enhanced security for applications employing downloadable...
Enhancement to volume license keys
Enterprise computer investigation system
Error-detectable license key fragmentation to facilitate...
Escrowed key distribution for over-the-air service...
Establishing authenticated network connections
Establishing initial PuK-linked account database
Establishing secure mutual trust using an insecure password
Establishing shared information in a network
Establishing trust without revealing identity
Evidencing indicia of value using secret key cryptography
Examination apparatus, communication system, examination...
Exclusive set system constructions including, but not...
Extended authenticated key exchange
Extending the range of computational fields of integers
Extending the range of computational fields of integers
Extensible authentication system and method
Extensible system for building and evaluating credentials
Extracting digital watermarks using logarithmic sampling and...