Method for integrating online and offline cryptographic...
Method for interchange of cryptographic codes between a...
Method for issuing a new authenticated electronic ticket based o
Method for key agreement for a cryptographic secure...
Method for loading an application in a device, device and...
Method for locating a stolen electronic device using electronic
Method for logically binding and verifying a subassembly in...
Method for mail address block image information encoding,...
Method for making a blind RSA-signature and apparatus therefor
Method for making secure a session with data processing...
Method for managing an executable code downloaded in a...
Method for managing certificate revocation list by...
Method for managing operability of on-chip debug capability
Method for managing security for card-type storage medium and a
Method for mapping an encrypted https network packet to a...
Method for masking secret multiplicands
Method for modifying validity of a certificate using...
Method for modifying validity of a certificate using...
Method for monitoring a BIOS
Method for monitoring software using encryption including...