Log-on service providing credential level change without...
Log-on verification protocol
Login permission with improved security
Logon authentication and security system and method
Long-life digital certification for publishing long-life...
Low cost packet originator verification for intermediate nodes
Low cost packet originator verification for intermediate nodes
Low I/O bandwidth method and system for implementing...
Low power HMAC encryption apparatus
Low-interference communications device using chaotic signals
Low-latency data decryption interface
Low-latency data decryption interface
MACSec implementation
Mailing list server and mail re-sending method thereof
Maintaining a soft-token private key store in a distributed...
Maintaining a soft-token private key store in a distributed...
Maintaining confidentiality of personal information during...
Maintaining packet security in a computer network
Making CGI variables and cookie information available to an...
Malicious mobile code runtime monitoring system and methods