Authenticated communication procedure for network computers
Authenticated firewall tunneling framework
Authenticated search engines
Authenticating endpoints of a voice over internet protocol...
Authenticating legacy service via web technology
Authentication and authorization in a multi-tier relational...
Authentication chip with protection from power supply attacks
Authentication device with electronic authentication communicati
Authentication program for a computer operating system
Authentication system using authentication information valid one
Authentication system using network
Authentication systems, methods, and computer program products
Authority delegation with secure operating system queues
Authorization systems, methods, and computer program products
Auto-recoverable and auto-certifiable cryptosystem with unescrow
Automated password reset
Automated public key certificate transfer
Automatic rotation of digit location in devices used in...
Automatic virtual private network internet snoop avoider
Automatically generating valid behavior specifications for...