Method of bilateral identity authentication
Method of certifying transmission, reception and...
Method of checking the authenticity of an electric circuit...
Method of ciphering data transmission, and cellular radio...
Method of clock routing for semiconductor chips
Method of communicating securely between an application...
Method of communications and communication network intrusion...
Method of connecting base station to cellular system
Method of constructing domain based on public key and...
Method of constructing domain based on public key and...
Method of controlling the processing of data
Method of controlling usage of software components
Method of copying and decrypting encrypted digital data and...
Method of cryptological authentification in a scanning...
Method of detaching a security device from a personal computer
Method of detecting and authenticating connection target for...
Method of distributing piracy protected computer software
Method of downloading of data to an MPEG receiver/decoder...
Method of dynamically assigning network access priorities
Method of dynamically assigning network access priorities