Efficient encryption and authentication for data processing...
Efficient hash table protection for data transport protocols
Efficient hybrid public key signature scheme
Efficient implementation of zero knowledge protocols
Efficient method for operating system deployment
Efficient method for providing secure remote access
Efficient method for providing secure remote access
Efficient optical network design using multi-granular...
Efficient power supply for rapidly changing power requirements
Efficient processing of time-bounded messages
Efficient resource mapping beyond installed memory space by...
Efficient retrieval of cryptographic evidence
Efficient revocation of receivers
Efficient revocation of receivers
Efficient scanning of stream based data
Efficient security association establishment negotiation...
Efficient security for mashups
Efficient utilization of a multi-source network of control...
Efficient variably-channelized SONET multiplexer and payload...
Efficient, secure multicasting with global knowledge