Piggy-backed key exchange protocol for providing secure,...
PIN recovery in a smart card
Portable authentication and access control involving...
Portable device and a method for accessing a computer...
Portable device and a method for accessing a computer...
Portable device for accessing host computer via remote computer
Portable device having biometrics-based authentication...
Portable network encryption keys
Portable network encryption keys
Pre-licensing of rights management protected content
Predictive method for multi-party strengthening of...
Preventing a non-head end based service provider from...
Print system, apparatus, and method for performing printing...
Printing method, print system and program
Printing via user equipment
Privacy protection for mobile internet protocol sessions
Private key protection for secure servers
Proactive network security system to protect against hackers
Proactive network security system to protect against hackers
Problem determination method suitable for use when a filter...