| 8224754 |
Generation, distribution and verification of tokens using a secure hash algorithm |
Andrzej Pastusiak, Arun Sacheti, Ting Cai, Josh Benaloh, Rajesh Kuppuswamy |
2012-07-17 |
| 8122253 |
Data validation using signatures and sampling |
Neeraj Garg, Cale D. Carter, Kulothungan Rajasekaran, Pankaj Kumar Singh |
2012-02-21 |
| 8051288 |
Data validation using signatures and sampling |
Neeraj Garg, Cale D. Carter, Kulothungan Rajasekaran, Pankaj Kumar Singh |
2011-11-01 |
| 7966279 |
Data validation using signatures and sampling |
Neeraj Garg, Cale D. Carter, Kulothungan Rajasekaran, Pankaj Kumar Singh |
2011-06-21 |
| 7484096 |
Data validation using signatures and sampling |
Neeraj Garg, Cale D. Carter, Kulothungan Rajasekaran, Pankaj Kumar Singh |
2009-01-27 |
| 7457791 |
Using invariants to validate applications states |
Neeraj Garg, Cale D. Carter, Kulothungan Rajasekaran, Pankaj Kumar Singh, Mahesh Jayaram |
2008-11-25 |