| 4908861 |
Data authentication using modification detection codes based on a public one way encryption function |
Bruno O. Brachtl, Don Coppersmith, Myrna M. Hyden, Stephen M. Matyas, Carl H. W. Meyer +2 more |
1990-03-13 |
| 4757534 |
Code protection using cryptography |
Stephen M. Matyas |
1988-07-12 |
| 4755940 |
Transaction security system |
Bruno O. Brachtl, Christopher J. Holloway, Richard E. Lennon, Stephen M. Matyas, Carl H. W. Meyer |
1988-07-05 |
| 4747050 |
Transaction security system using time variant parameter |
Bruno O. Brachtl, Christopher J. Holloway, Richard E. Lennon, Stephen M. Matyas, Carl H. W. Meyer |
1988-05-24 |
| 4649233 |
Method for establishing user authenication with composite session keys among cryptographically communicating nodes |
Walter E. Bass, Stephen M. Matyas |
1987-03-10 |
| 4227253 |
Cryptographic communication security for multiple domain networks |
William F. Ehrsam, Robert C. Elander, Lloyd L. Hollis, Richard E. Lennon, Stephen M. Matyas +2 more |
1980-10-07 |
| 4193131 |
Cryptographic verification of operational keys used in communication networks |
Richard E. Lennon, Stephen M. Matyas, Carl H. W. Meyer, Paul N. Prentice, Walter L. Tuchman |
1980-03-11 |