List of redirects
Showing below up to 41 results in range #1 to #41.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Access → Access Control
- Authorization to Use → Authority to Operate
- Biometric Identifier → Biometric Factor
- Bitcoin → Digital Asset
- Block Chain → Blockchain
- CUI → Controlled Unclassified Information
- Complexity Theory → Computational Complexity Theory
- Decentralize Resource Identifier → Decentralized Resource Identifier
- Decentralized Identifiers → Decentralized Identifier
- Derived Motile Credential → Derived Mobile Credential
- Digital Right Management → Digital Rights Management
- EHI → PHI
- FedRamp → FedRAMP
- Federation Service → Federation Trust Registry
- Federation Trust Repository → Federation Trust Registry
- First-Party Set → Related Website Sets
- IAP → Identifier or Attribute Provider
- Identity Management → Management Management
- Identity Pathologies → Identity Pathology
- Internet Conntection Sharing → Internet Connection Sharing
- MDL Considered Evil → MDL Considered Harmfull
- MDL Considered Harmfull → MDL Considered Harmful
- Management Management → Identifier Management
- Mobil Threat Analysis → Mobile Threat Analysis
- OP → OpenID Provider
- Open Secure Device Protocol → Open Supervised Device Protocol
- POS → Point of Sale
- Peer-to-peer Network → Peer-to-Peer Network
- Phishing. → Phishing
- RP → Relying Party
- Risk Assessment → Risk Analysis
- Single Sign On → Single Sign-On
- Smart Phone → Smartphone
- The Web → World Wide Web
- Thousand Points of Light → Hundred Points of Light
- Trust Registry → Federation Trust Registry
- Trusted Identifier in Cyberspace → Trusted Identifiers in Cyberspace
- Trusted Identity in Cyberspace → Trusted Identifier in Cyberspace
- UMA → User Managed Access
- Unclonable Identity → Unclonable Identifier
- Web Authentication Level 2 → Web Authentication Levels