Authenticity verification methods, products and apparatuses
Authentification of data in a digital transmission system
Author signatures for legal purposes
Author signatures for legal purposes
Authority and integrity check in systems lacking a public key
Authority delegation with secure operating system queues
Authorization firmware for conducting transactions with an...
Authorization infrastructure based on public key cryptography
Authorization key system for selectively controlling the...
Authorization method
Authorization of services in a conditional access system
Authorization of services in a conditional access system
Authorization process using a certificate
Authorization systems, methods, and computer program products
Authorizing an additional computer program module for use...
Auto tune dynamic over clocking
Auto-escrowable and auto-certifiable cryptosystems
Auto-recoverable and auto-certifiable cryptosystem with unescrow
Autoconfigured prefix delegation based on distributed hash
Automated application fail-over for coordinating...