User controlled anonymity when evaluating into a role
User identifying method and system in computer communication net
User selection of computer login
Using a key lease in a secondary authentication protocol...
Using classification techniques in digital watermarking
Using device certificates to authenticate servers before...
Using digital certificates to facilitate enforcement of...
Using digital certificates to request client consent prior...
Using multiple watermarks to protect content material
Using token-based signing to install unsigned binaries
Using watermarking to reduce communication overhead