Authenticated ID-based cryptosystem with no key escrow
Authenticated ID-based cryptosystem with no key escrow
Authenticated identity propagation and translation within a...
Authenticated key agreement protocol
Authenticated key exchange based on pairwise master key
Authenticated key exchange based on pairwise master key
Authenticated program execution method
Authenticated search engines
Authenticated time device
Authenticating address ownership using care-of address (COA)...
Authenticating an endpoint using a STUN server
Authenticating communications
Authenticating concealed private data while maintaining...
Authenticating endpoints of a voice over internet protocol...
Authenticating images from digital cameras
Authenticating legacy service via web technology
Authenticating maintenance access to an electronics unit via...
Authenticating media signals by adjusting frequency...
Authenticating method between a smart card and a terminal
Authenticating method for short-distance radio devices and a...