User selection of computer login
Using a key lease in a secondary authentication protocol...
Using classification techniques in digital watermarking
Using device certificates to authenticate servers before...
Using digital certificates to facilitate enforcement of...
Using digital certificates to request client consent prior...
Using multiple watermarks to protect content material
Using token-based signing to install unsigned binaries
Using watermarking to reduce communication overhead
Validated mutual authentication
Validating client-receivers
Validating inbound messages
Validation for secure device associations
Validation for secure device associations
Validation of inclusion of a platform within a data center
Vehicle antitheft system
Verification data generating apparatus, data verification...
Verification of authenticity
Verification of correct exponentiation or other operations...
Verification of electronic signatures