Tag authentication system
Tamper resistant method and apparatus
Tamper resistant module certification authority
Tamper resistant module having separate control of issuance...
Tamper-evident data management
Tamper-proof devices for unique identification
Tamper-proof electronic processing device
Tamper-resistant communication layer for attack mitigation...
Technique for digitally notarizing a collection of data streams
Technique for distributing software
Technique for establishing provable chain of evidence
Technique for generating control messages with reason...
Technique for obtaining a single sign-on certificate from a...
Technique for producing a privately authenticatable product...
Technique for producing privately authenticatable cryptographic
Technique for producing through watermarking highly...
Technique for producing, through watermarking, highly...
Techniques for detecting, analyzing, and using visible...
Techniques for reducing the computational cost of embedding...
Telecommunications device and method