Technique for generating control messages with reason...
Technique for generating correlation number for use in...
Technique for generating memory clock in video controller
Technique for handling subsequent user identification and...
Technique for handling subsequent user identification and...
Technique for localizing keyphrase-based data encryption and...
Technique for obtaining a single sign-on certificate from a...
Technique for practically measuring cycle-by-cycle...
Technique for producing a privately authenticatable product...
Technique for producing privately authenticatable cryptographic
Technique for producing through watermarking highly...
Technique for producing, through watermarking, highly...
Technique for reconstituting a pre-boot firmware environment...
Technique for regulating power-supply efficiency in a...
Technique for reliable network booting of an operating system to
Technique for secure network transactions
Technique for securely storing data within a memory
Technique for synchronizing clocks in a network
Technique for synchronizing network devices in an access...
Technique for synchronizing network devices in an access...