Using classification techniques in digital watermarking
Using device certificates to authenticate servers before...
Using digital certificates to facilitate enforcement of...
Using digital certificates to request client consent prior...
Using digital signatures to validate trading and streamline...
Using dynamic web components to remotely control the...
Using dynamic web components to remotely control the...
Using mobility tokens to observe malicious mobile code
Using multiple watermarks to protect content material
Using SYN-ACK cookies within a TCP/IP protocol
Using TCP to authenticate IP source addresses
Using time to determine a hash extension
Using token-based signing to install unsigned binaries
Using trusted communication channel to combat user...
Using voice over IP or instant messaging to connect to...
Using watermarking to reduce communication overhead
Validated mutual authentication
Validating and certifying execution of a software program...
Validating client-receivers
Validating connections to a network system