Technique for generating correlation number for use in...
Technique for handling subsequent user identification and...
Technique for obtaining a single sign-on certificate from a...
Technique for producing a privately authenticatable product...
Technique for producing privately authenticatable cryptographic
Technique for producing through watermarking highly...
Technique for producing, through watermarking, highly...
Technique for secure network transactions
Technique for synchronizing security credentials from a...
Technique for synchronizing security credentials using a...
Techniques for detecting, analyzing, and using visible...
Techniques for permitting access across a context barrier in...
Techniques for permitting access across a context barrier on...
Techniques for reducing the computational cost of embedding...
Techniques for secure event recording and processing
Techniques for secure network searching
Techniques for securing data flow in internet multicasting
Telecommunication system, for example an IP...
Telecommunication terminal comprising two execution spaces
Telecommunications device and method