| http://www.w3.org/ns/prov#value | - The technique, such as practiced in a user equipment or other wireless communication device, capitalizes on the advantageous recognition herein that the demodulation results obtained for at least some types of received data blocks may be inspected or otherwise evaluated for characteristic patterns that are indicative of whether the data block was or was not ciphered for transmission.
|