$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Block cipher system for data security 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0552685 (1975-02-24)
발명자 / 주소
  • Ehrsam William Friedrich (Hurley NY) Meyer Carl H. W. (Kingston NY) Powers Robert Lowell (West Hurley NY) Prentice Paul Norman (Hyde Park NY) Smith John Lynn (Woodstock NY) Tuchman Walter Leonard (Wo
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 196  인용 특허 : 0

초록

A device for ciphering message blocks of data bits under control of a cipher key. The cipher device performs an enciphering process for each message block of data by carrying out a predetermined number of iteration operations in the first of which a first half of the message block of data bits is fi

대표청구항

A device for ciphering a message block of data bits under control of a set of cipher key bits by a predetermined number of iteration operations, said cipher device comprising: first store means storing a first half of said message block of data bits, second store means storing a second half of said

이 특허를 인용한 특허 (196)

  1. Kim Kwang Jo,KRX ; Lee Sang Jin,KRX ; Park Sang Joon,KRX ; Goh Seung Cheol,KRX ; Lee Dai Ki,KRX, Apparatus and method for generating a secure substitution-box immune to cryptanalyses.
  2. Gordon John A. (Hatfield GB2), Apparatus for electronic encypherment of digital data.
  3. Ambrosius, III, William H.; Rossean, Larry D., Chip topography for MOS Data Encryption Standard circuit.
  4. Scordo Dominick (Middletown NJ), Common control audio decryptor.
  5. Check ; Jr. Frank T. (Orange CT), Computer accessing system.
  6. Smith James G. (Laurel CAX), Computer communications control.
  7. Paone Luciano F., Computer implemented secret object key block cipher encryption and digital signature device and method.
  8. Johnstone ; Richard, Computer software security system.
  9. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  10. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor for executing enciphered programs.
  11. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor that executes enciphered programs.
  12. Best Robert M. (16016 - 9th Ave. NE. Seattle WA 98155), Crypto microprocessor using block cipher.
  13. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Powers Robert L. (West Hurley NY) Prentice Paul N. (Hyde Park NY) , Cryptographic communication and file security using terminals.
  14. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Powers Robert L. (West Hurley NY) Prentice Paul N. (Hyde Park NY) , Cryptographic communication security for single domain networks.
  15. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Smith John L. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for single domain networks.
  16. Horne Donald R. (Don Mills CAX) Jeffers John M. (Downsview CAX), Cryptographic system using interchangeable key blocks and selectable key fragments.
  17. Matchett,Noel D.; Hershey,John E., Cryptographic system with enhanced encryption function and cipher key for data encryption standard.
  18. Lai Yi-Sern,TWX ; Chuang I-Yao,TWX ; Chiou Bor-Wen,TWX ; Yang Chin-Ning,TWX, DES cipher processor for full duplex interleaving encryption/decryption service.
  19. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  20. Mueller Kurt H. (Wallisellen CHX), Enciphering/deciphering system.
  21. Oomori, Motoji; Yokota, Kaoru; Sekibe, Tsutomu; Tatebayashi, Makoto; Sano, Fumihiko; Kawamura, Shinichi, Extended key generator, encryption/decryption unit, extended key generation method, and storage medium.
  22. Henry Paul S. (Holmdel NJ), Fast real-time public key cryptography.
  23. Freeman, Daniel; Freeman, Ari, Fully automatic key duplicating machine with automatic key model identification system.
  24. Freeman, Daniel; Freeman, Ari, Fully automatic key duplicating machine with automatic key model identification system.
  25. Freeman, Daniel, Fully automatic self-service key duplicating kiosk.
  26. Freeman, Daniel, Fully automatic self-service key duplicating kiosk.
  27. Campbell ; Jr. Carl M. (Newtown Square PA), Key variable generator for an encryption/decryption device.
  28. Ehrsam ; William F. ; Meyer ; Carl H. W. ; Smith ; John L. ; Tuchman ; W alter L., Message verification and transmission error detection by block chaining.
  29. Kulczyckyj Antin U. (Cinnaminson NJ) Goszyk Kurt A. (Washington Crossing PA), Method and apparatus for controlling access in a data transmission system.
  30. Merkle Ralph C. (Sunnyvale CA), Method and apparatus for data encryption.
  31. Michener John R. (Princeton NJ), Method and apparatus for securing access to a computer facility.
  32. Gargiulo Joseph L. (5418 Main St. Trumbull CT 06611) Pastor Jose (191 Wilton Rd. Westport CT 06880), Method and apparatus for the generation and synchronization of cryptographic keys.
  33. Kiszely,Timothy W., Method and apparatus to implement the data encryption standard algorithm.
  34. Sandberg, Melanie J.; Schaffer, Scott J., Method and system for generating ciphertext and message authentication codes utilizing shared hardware.
  35. Sandberg, Melanie J.; Schaffer, Scott J., Method and system for generating ciphertext and message authentication codes utilizing shared hardware.
  36. Sandberg, Melanie J.; Schaffer, Scott J., Method and system for generating ciphertext and message authentication codes utilizing shared hardware.
  37. Becker Wolfram (Niedernhausen DEX), Method and system for machine enciphering and deciphering.
  38. Matyas Stephen M. (Kingston NY) Meyer Carl H. W. (Kingston NY), Method for authenticating the identity of a user of an information system.
  39. Sourgen Laurent,FRX ; Wuidart Sylvie,FRX, Method for numerically scrambling data and its application to a programmable circuit.
  40. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  41. Wood Michael C. (Jamestown NY), Method of cryptographically transforming electronic digital data from one form to another.
  42. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  43. Schmidt Walter E. (604 W. 115th St. ; Apt. B New York NY 10025), Methods and apparatus for the protection and control of computer programs.
  44. Roberts,Paul Cador, Methods and systems for generating encryption keys using random bit generators.
  45. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  46. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  47. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  48. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Microprocessor for executing enciphered programs.
  49. Omura Jimmy K. (Cupertino CA), Modulo arithmetic processor chip.
  50. Freeman, Daniel, Network of fully automatic self-service key duplicating kiosks.
  51. Freeman, Daniel, Network of fully automatic self-service key duplicating kiosks.
  52. Garcia John D. (San Francisco CA), Personal identification apparatus.
  53. Aakre David E. (Kasson MN) Hoffman Roy L. (Pine Island MN) Moen David N. (Rochester MN) Schmierer Quentin G. (Rochester MN), Real time data transformation and transmission overlapping device.
  54. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Remote access terminal security.
  55. Billings, Raymond J., Secure copy method and device for stored programs.
  56. Shutterly ; Harold B., Secure television transmission system.
  57. Bright Herbert S. (Bethesda MD) Enison Richard L. (San Pablo CA), Security system for data processing.
  58. Campbell Carl M. (Newtown Square PA), Security system for electronic funds transfer system.
  59. Campbell Carl M. (Newtown Square PA), Security system for electronic funds transfer system.
  60. Freeman, Daniel; Freeman, Ari, Self service key duplicating machine with automatic key model identification system.
  61. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and method.
  62. Harvey John Christopher ; Cuddihy James William, Signal processing apparatus and methods.
  63. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  64. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  65. Harvey, John Christopher; Ciddihy, James William, Signal processing apparatus and methods.
  66. Harvey, John Christopher; Cuddihy, James Willam, Signal processing apparatus and methods.
  67. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  68. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  69. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  70. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  71. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  72. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  73. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  74. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  75. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  76. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  77. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  78. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  79. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  80. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  81. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  82. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  83. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  84. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  85. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  86. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  87. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  88. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  89. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  90. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  91. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  92. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  93. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  94. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  95. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  96. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  97. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  98. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  99. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  100. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  101. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  102. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  103. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  104. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  105. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  106. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  107. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  108. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  109. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  110. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  111. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  112. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  113. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  114. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  115. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  116. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  117. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  118. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  119. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  120. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  121. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  122. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  123. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  124. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  125. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  126. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  127. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  128. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  129. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  130. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  131. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  132. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  133. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  134. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  135. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  136. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  137. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  138. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  139. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  140. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  141. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  142. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  143. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  144. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  145. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  146. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  147. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  148. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  149. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  150. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  151. Feistel Horst (Mount Kisco NY), Stream/block cipher crytographic system.
  152. Wei, Justin Y.; Dambre, Antoine; Ahn, Christopher; Chhabra, Gurvinder Singh, Streaming alignment of key stream to unaligned data stream.
  153. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  154. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  155. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  156. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  157. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  158. Riebe,Heinrich Henning; Aldis,David, System for persistently encrypting critical software data to control the operation of an executable software program.
  159. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  160. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  161. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  162. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  163. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  164. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  165. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  166. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  167. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  168. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  169. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  170. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  171. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  172. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  173. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  174. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  175. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  176. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  177. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  178. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  179. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  180. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  181. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  182. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  183. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  184. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  185. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  186. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  187. Van Loon, Johannes Maria; Schenk, Michael Robert, Telecommunications network and method for time-based network access.
  188. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  189. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  190. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  191. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  192. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  193. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  194. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  195. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  196. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로