| 10437985 |
Using a second device to enroll a secure application enclave |
Paritosh Saxena, Ernie Brickell, Thomas J. Barnes |
2019-10-08 |
| 8533465 |
System and method of encrypting network address for anonymity and preventing data exfiltration |
— |
2013-09-10 |
| 7916739 |
Location privacy for internet protocol networks using cryptographically protected prefixes |
Muhammad Bin Tariq, Hosei Matsuoka, James Kempf, Ravi Jain, Toshiro Kawahara |
2011-03-29 |
| 7660983 |
Method and apparatus for creating a secure communication channel among multiple event service nodes |
Sunil K. Srivastava, Raymond Bell, Ramprasad Golla |
2010-02-09 |
| 7644439 |
Timing attacks against user logon and network I/O |
— |
2010-01-05 |
| 7502927 |
Directory enabled secure multicast group communications |
Raymond Bell, Ramprasad Golla, Sunil K. Srivastava |
2009-03-10 |
| 7383436 |
Method and apparatus for distributing and updating private keys of multicast group managers using directory replication |
Sunil K. Srivastava, Raymond Bell, Ramprasad Golla |
2008-06-03 |
| 7296155 |
Process and system providing internet protocol security without secure domain resolution |
William Gossman |
2007-11-13 |
| 7174569 |
Client security for networked applications |
— |
2007-02-06 |
| 7103185 |
Method and apparatus for distributing and updating private keys of multicast group managers using directory replication |
Sunil K. Srivastava, Raymond Bell, Ramprasad Golla |
2006-09-05 |
| 7089211 |
Directory enabled secure multicast group communications |
Raymond Bell, Ramprasad Golla, Sunil K. Srivastava |
2006-08-08 |
| 7013389 |
Method and apparatus for creating a secure communication channel among multiple event service nodes |
Sunil K. Srivastava, Raymond Bell, Ramprasad Golla |
2006-03-14 |
| 6775783 |
Client security for networked applications |
— |
2004-08-10 |
| 6718467 |
Password based protocol for secure communications |
— |
2004-04-06 |
| 5919257 |
Networked workstation intrusion detection system |
— |
1999-07-06 |
| 5590199 |
Electronic information network user authentication and authorization system |
Marjan Krajewski, Jr., John C. Chipchak, David A. Chodorow, Peter T. Baldwin |
1996-12-31 |