Undeniable certificates for digital signature verification
Undeniable digital signature scheme based on quadratic field
Unique block header patterns for media verification
Unique digital signature
Unique digital signature
Upgradeable timestamp mechanism
Use and generation of a session key in a secure socket layer...
Use of identification codes in the handling and management...
Use of modular roots to perform authentication including,...
Use of modular roots to perform authentication including,...
Use of modular roots to perform authentication including,...
Use of pseudonyms vs. real names
Use of public switched telephone network for capturing...
Use of short message service (SMS) for secure transactions
Use of variant and base keys with two entities
User authentication based on asymmetric cryptography...
User authentication in a communications network
User authentication system for authenticating an authorized user
User certificate system and method for data broadcasting
User controlled anonymity when evaluating into a role