Method to enable user mode process to operate in a...
Method to generate, verify and deny an undeniable signature
Method to maximize hardware utilization in flow-thru IPsec...
Method to provide authorization from a certifying authority...
Method to use secure passwords in an unsecure program...
Method using access authorization differentiation in...
Method, apparatus and article for off-line certification in...
Method, apparatus and article for off-line certification in...
Method, apparatus and computer program product for a network...
Method, apparatus and system for compressing IPSec-protected...
Method, apparatus, and manufacture for decryption of network...
Method, apparatus, and program for automated trust zone...
Method, apparatus, and program product for automatically...
Method, apparatus, and program product for securely...
Method, apparatus, and system for managing, reviewing,...
Method, apparatus, system and information storage medium for wir
Method, computer program product and system for providing a...
Method, device and arrangement for inserting extra information
Method, device, and network for providing secure...
Method, server system and device for making safe a...