| 9742560 |
Key management in secure network enclaves |
Daniel R. Simon, Brian D. Swander, Pascal Menezes |
2017-08-22 |
| 9628276 |
Discovery of secure network enclaves |
Daniel R. Simon, Brian D. Swander, Pascal Menezes |
2017-04-18 |
| 8913747 |
Secure configuration of a wireless sensor network |
— |
2014-12-16 |
| 8352741 |
Discovery of secure network enclaves |
Daniel R. Simon, Brian D. Swander, Pascal Menezes |
2013-01-08 |
| 8307071 |
Fine-grained location determination of networked computers |
Austin Donnelly, Bernard Aboba, Roy D. Kuntz, Noor-E-Gagan Singh, Tim Moore |
2012-11-06 |
| 8069470 |
Identity and authentication in a wireless network |
— |
2011-11-29 |
| 8051489 |
Secure configuration of a wireless sensor network |
— |
2011-11-01 |
| 7885668 |
Determining the network location of a user device based on transmitter fingerprints |
— |
2011-02-08 |
| 7647637 |
Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability |
Christoph L. Schuba, Dwight F. Hare |
2010-01-12 |
| 7561694 |
Session mobility for wireless devices |
Samita Chakrabarti, Randall B. Smith |
2009-07-14 |
| 7515576 |
User interface and data structure for transmitter fingerprints of network locations |
— |
2009-04-07 |
| 7434051 |
Method and apparatus for facilitating secure cocktail effect authentication |
Damine Bailly |
2008-10-07 |
| 7401215 |
Method and apparatus for facilitating cryptographic layering enforcement |
Julien H. Laganier |
2008-07-15 |
| 6571289 |
Chained registrations for mobile IP |
— |
2003-05-27 |
| 6233688 |
Remote access firewall traversal URL |
— |
2001-05-15 |
| 5619645 |
System isolation and fast-fail |
Steven J. Drach, Ho Yin Starsky Wong |
1997-04-08 |