Method and system for verifying the authenticity of a first...
Method and system for verifying the authenticity of a first...
Method and system for wireless intrusion detection,...
Method and system for wireless intrusion detection...
Method and system in a wireless communications network for provi
Method and system to protect the privacy of presence...
Method and system which uses sound wave based communication...
Method and user device for reproducing a data file
Method enabling detection of stolen mobile communication...
Method for authorizing a communication between at least two...
Method for common usage of mobile switching center (MSC)
Method for controlling the access authorizations of...
Method for detecting access to controlled areas and related...
Method for detecting fraudulent use of a communications system
Method for determining the security status of transmissions...
Method for fast roaming in a wireless network
Method for fast roaming in a wireless network
Method for fast roaming in a wireless network
Method for foiling cellular telephone cloning
Method for handling global challenge authentication...