Use of kernel authorization data to maintain security in a...
Use of modular roots to perform authentication including,...
Use of modular roots to perform authentication including,...
Use of modular roots to perform authentication including,...
Use of pseudocode to protect software from unauthorized use
Use of pseudonyms vs. real names
Use of public switched telephone network for capturing...
Use of short message service (SMS) for secure transactions
Use of variant and base keys with two entities
User authentication based on asymmetric cryptography...
User authentication from non-native server domains in a computer
User authentication in a communications network
User authentication system and user authentication method
User authentication system for authenticating an authorized user
User authentification using a virtual private key
User certificate system and method for data broadcasting
User control of web browser user data
User controlled anonymity when evaluating into a role
User controlled anonymity when evaluating into a role
User customizable secure access token and multiple level...