Using a portable security token to facilitate public key...
Using a portable security token to facilitate...
Using a rights template to obtain a signed rights label...
Using a rules model to improve handling of personally...
Using ACPI power button signal for remotely controlling the...
Using an independent clock to coordinate access to registers...
Using asymmetric lanes dynamically in a multi-lane serial link
Using atomic messaging to increase the security of...
Using authentication certificates for authorization
Using authentication server accounting to create a common...
Using biometrics on pervasive devices for mobile identification
Using biometrics on pervasive devices for mobile identification
Using chip select to specify boot memory
Using chip select to specify boot memory
Using classification techniques in digital watermarking
Using device certificates for automated authentication of...
Using device certificates to authenticate servers before...
Using digital certificates to facilitate enforcement of...
Using digital certificates to request client consent prior...
Using digital signatures to validate trading and streamline...