Secure user identification based on constrained polynomials
Secure virtual interface
Secure virtual LANs
Secure wireless communications system and related method
Secure wireless electronic-commerce system with digital...
Secure wireless electronic-commerce system with wireless...
Secure wiretap support for internet protocol security
Secure write blocking circuit and method for preventing...
Secure, efficient, and mutually authenticated cryptographic...
Secured access using a position-coded system
Secured data format for access control
Secured encrypted communications in a voice browser
Secured network system
Secured network system
Secured peer-to-peer network data exchange
Secured signal modification and verification with privacy...
Secured signal modification and verification with privacy...
Secured system for accessing application services from a...
Securely downloading and executing code from mutually suspicious
Securely extensible component meta-data