List of redirects

Jump to: navigation, search

Showing below up to 46 results in range #1 to #46.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Access →‎ Access Control
  2. Authorization to Use →‎ Authority to Operate
  3. Biometric Identifier →‎ Biometric Factor
  4. Bitcoin →‎ Digital Asset
  5. Block Chain →‎ Blockchain
  6. CUI →‎ Controlled Unclassified Information
  7. Cellular Automota →‎ Cellular Automata
  8. Complexity Theory →‎ Computational Complexity Theory
  9. Decentralize Resource Identifier →‎ Decentralized Resource Identifier
  10. Decentralized Identifiers →‎ Decentralized Identifier
  11. Derived Motile Credential →‎ Derived Mobile Credential
  12. Digital Right Management →‎ Digital Rights Management
  13. EHI →‎ PHI
  14. FedRamp →‎ FedRAMP
  15. Federation Service →‎ Federation Trust Registry
  16. Federation Trust Repository →‎ Federation Trust Registry
  17. First-Party Set →‎ Related Website Sets
  18. IAP →‎ Identifier or Attribute Provider
  19. Identity Management →‎ Management Management
  20. Identity Pathologies →‎ Identity Pathology
  21. Indistinguishability Obfuscation →‎ Obfuscation
  22. Intelligent Tracking Prevention →‎ Intelligent Tracking
  23. Internet Conntection Sharing →‎ Internet Connection Sharing
  24. MDL Considered Evil →‎ MDL Considered Harmfull
  25. MDL Considered Harmfull →‎ MDL Considered Harmful
  26. Management Management →‎ Identifier Management
  27. Mobil Threat Analysis →‎ Mobile Threat Analysis
  28. OP →‎ OpenID Provider
  29. Open Secure Device Protocol →‎ Open Supervised Device Protocol
  30. POS →‎ Point of Sale
  31. Payment on Apple →‎ Mobile Payment
  32. Peer-to-peer Network →‎ Peer-to-Peer Network
  33. Phishing. →‎ Phishing
  34. RP →‎ Relying Party
  35. Risk Assessment →‎ Risk Analysis
  36. Single Sign On →‎ Single Sign-On
  37. Smart Phone →‎ Smartphone
  38. Soverign →‎ Sovereign
  39. The Web →‎ World Wide Web
  40. Thousand Points of Light →‎ Hundred Points of Light
  41. Trust Registry →‎ Federation Trust Registry
  42. Trusted Identifier in Cyberspace →‎ Trusted Identifiers in Cyberspace
  43. Trusted Identity in Cyberspace →‎ Trusted Identifier in Cyberspace
  44. UMA →‎ User Managed Access
  45. Unclonable Identity →‎ Unclonable Identifier
  46. Web Authentication Level 2 →‎ Web Authentication Levels

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)