Oldest pages
Showing below up to 230 results in range #521 to #750.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- User Choice Experience (15:51, 1 February 2022)
- Consent to Create Binding (15:56, 1 February 2022)
- User-centric Consent (11:55, 4 February 2022)
- Presentation (16:46, 4 February 2022)
- Direct Presentation (18:10, 5 February 2022)
- EID (16:44, 8 February 2022)
- Presentation from a Wallet (20:19, 8 February 2022)
- Zenkey App (19:45, 9 February 2022)
- Fake Identifier (19:48, 9 February 2022)
- Personally Identifiable Information (20:01, 9 February 2022)
- National Security (14:41, 10 February 2022)
- Least Privilege (14:52, 10 February 2022)
- Permissioned Blockchain (22:48, 10 February 2022)
- Privacy in Mobile Credentials (10:45, 13 February 2022)
- Attacks (10:48, 13 February 2022)
- Attaks on Privacy (14:20, 13 February 2022)
- Consent Management (15:34, 13 February 2022)
- Native App Security (10:48, 16 February 2022)
- Ethlas (12:54, 16 February 2022)
- Payment Request (13:33, 16 February 2022)
- Electronic Payment (13:38, 16 February 2022)
- Payment Method as Identity Proof (17:26, 16 February 2022)
- Assured Identity (19:30, 16 February 2022)
- Disruption (08:58, 21 February 2022)
- Address as Identity Proof (09:12, 21 February 2022)
- Proof of Presence (09:15, 21 February 2022)
- Claim (12:53, 21 February 2022)
- Assurance (13:26, 21 February 2022)
- Biometric Attribute (11:52, 22 February 2022)
- AML (13:04, 22 February 2022)
- Identity Regulation (10:47, 23 February 2022)
- Smartphone (14:14, 23 February 2022)
- Trust in Financial Institutions (15:07, 23 February 2022)
- Digital Signature (17:34, 23 February 2022)
- Intentionality (12:39, 24 February 2022)
- User Intent (12:39, 24 February 2022)
- Metabiology (13:44, 24 February 2022)
- EBSI (15:34, 24 February 2022)
- Identity Infrastructure (12:17, 25 February 2022)
- DNS (11:14, 26 February 2022)
- Computer Professional (16:10, 27 February 2022)
- Mind (18:09, 27 February 2022)
- Identity Ecosystem (11:33, 28 February 2022)
- Verifiable Presentation (22:46, 2 March 2022)
- Consent Receipt (18:44, 5 March 2022)
- Trust (16:58, 9 March 2022)
- Explainer (17:07, 9 March 2022)
- Intelligent Synthetic Force (17:08, 9 March 2022)
- Synthetic Identity (13:27, 10 March 2022)
- Crypto API (13:49, 10 March 2022)
- Executive Order on Cybersecurity (16:28, 10 March 2022)
- First-Party Set (12:06, 13 March 2022)
- Bounce Tracking (14:08, 14 March 2022)
- Entropy (18:50, 20 March 2022)
- Authentication Factor (14:52, 22 March 2022)
- Policy-Based Access Control (15:10, 22 March 2022)
- Quantum Information Theory (10:24, 27 March 2022)
- Main Page (17:09, 27 March 2022)
- Homeostasis (05:28, 3 April 2022)
- Bearer Token (12:51, 5 April 2022)
- Artificial Intelligence (19:24, 5 April 2022)
- Common Good (08:29, 6 April 2022)
- Biometric Identifier (09:59, 7 April 2022)
- Anonymous (10:05, 7 April 2022)
- Common Sense (10:32, 7 April 2022)
- Ethics (10:36, 7 April 2022)
- Vulnerable Identifier (11:22, 7 April 2022)
- Truth (13:31, 7 April 2022)
- IIS Security Practices (09:22, 8 April 2022)
- KERI (09:23, 8 April 2022)
- Matrix (09:24, 8 April 2022)
- Ball Park Ticket Acquisition (09:26, 8 April 2022)
- W3C Formal Objections (09:43, 8 April 2022)
- World Wide Web Consortium (09:52, 8 April 2022)
- World Wide Web (09:56, 8 April 2022)
- Web Site (09:57, 8 April 2022)
- User Web Experience (10:00, 8 April 2022)
- Web App (10:01, 8 April 2022)
- Web View (10:01, 8 April 2022)
- Web ID (10:02, 8 April 2022)
- Web Site Security (10:03, 8 April 2022)
- User Trust of a Web Site (10:04, 8 April 2022)
- Web Platform Identifier (10:04, 8 April 2022)
- Web App Manifest (10:05, 8 April 2022)
- A/B Testing (10:06, 8 April 2022)
- Web Site Identity (10:07, 8 April 2022)
- Complexity (17:12, 8 April 2022)
- Anarchy (17:02, 9 April 2022)
- Distributed Ledger Technology (18:07, 10 April 2022)
- Nodal Point (10:38, 13 April 2022)
- Order (10:52, 13 April 2022)
- Information Accumulation (10:56, 13 April 2022)
- Information Age (10:56, 13 April 2022)
- Information Hiding (10:57, 13 April 2022)
- Information Owner (10:58, 13 April 2022)
- Information Sharing (10:58, 13 April 2022)
- Information wants to be Free (11:00, 13 April 2022)
- Metaverse (11:27, 13 April 2022)
- Cybersecurity (15:45, 17 April 2022)
- DFARS (09:04, 19 April 2022)
- Real Name (14:17, 19 April 2022)
- Architecture Framework (18:33, 20 April 2022)
- Chance and Necessity (10:38, 21 April 2022)
- Reductionism (10:43, 21 April 2022)
- Data Dictionary (10:22, 24 April 2022)
- Attack (10:30, 24 April 2022)
- Digital Twin (16:55, 24 April 2022)
- Risk Management (11:34, 25 April 2022)
- Telehealth (14:39, 25 April 2022)
- Semantics (15:58, 25 April 2022)
- Differential Privacy (16:28, 25 April 2022)
- Mobile Device Management (16:11, 26 April 2022)
- Internet of Things (16:15, 26 April 2022)
- Device Management (16:15, 26 April 2022)
- Encryption (07:16, 28 April 2022)
- DevSecOps (17:02, 28 April 2022)
- User Private Information (17:41, 28 April 2022)
- Authority to Operate (17:50, 28 April 2022)
- Induction (13:43, 29 April 2022)
- Seeker (13:59, 29 April 2022)
- Authentication UX (11:59, 1 May 2022)
- Resource Integrity (22:10, 2 May 2022)
- Identity and Access Management (18:41, 3 May 2022)
- Identifier Standards (19:06, 3 May 2022)
- Blockchain (15:39, 5 May 2022)
- Emergency Identifier (09:17, 6 May 2022)
- Device Identifier (09:23, 6 May 2022)
- Network Address (09:28, 6 May 2022)
- Privacy Enhancing Technology Provider (12:50, 6 May 2022)
- Privacy Enhancing Credential (14:22, 6 May 2022)
- Linux for Health (14:49, 6 May 2022)
- Framework (16:35, 6 May 2022)
- Over 21 with Proof of Presence (10:42, 7 May 2022)
- Information (13:17, 7 May 2022)
- Ponzi Scheme (14:29, 7 May 2022)
- Attention (10:08, 10 May 2022)
- Domain (10:33, 10 May 2022)
- Domain Name System (10:38, 10 May 2022)
- Domain Name (11:15, 10 May 2022)
- Mobile Credential (11:50, 12 May 2022)
- TSA Logistics (13:38, 13 May 2022)
- Smartphone Wireless (13:16, 20 May 2022)
- The Internet as Spoiled Child (16:10, 20 May 2022)
- Identity Model (06:30, 21 May 2022)
- Software Statement (06:47, 21 May 2022)
- Decentralized (06:53, 21 May 2022)
- Inconvenience (10:10, 21 May 2022)
- Internet Security (18:07, 21 May 2022)
- Publicly Accessible Data and Code (18:07, 21 May 2022)
- PGP (18:09, 21 May 2022)
- Machine Readable Governance (09:26, 22 May 2022)
- Governance Framework (09:28, 22 May 2022)
- Digital Governance (09:44, 22 May 2022)
- Facial Recognition (15:10, 22 May 2022)
- Vulnerable Community (15:24, 22 May 2022)
- Underserved Communities (15:30, 22 May 2022)
- Data Category (10:18, 23 May 2022)
- Ontology (14:28, 23 May 2022)
- Category (17:41, 23 May 2022)
- Zero Trust Architecture (12:06, 24 May 2022)
- GDPR (11:05, 25 May 2022)
- Mobile Driver's License (18:03, 25 May 2022)
- Credential Aggregation (20:47, 25 May 2022)
- Identifier use in Browsers (17:02, 26 May 2022)
- Browser (17:02, 26 May 2022)
- Browser Identity Interactions (17:02, 26 May 2022)
- Trusted Browser (17:03, 26 May 2022)
- Add to Home Screen (17:04, 26 May 2022)
- PWA initiators (17:06, 26 May 2022)
- Service Worker (17:07, 26 May 2022)
- Web Payments (17:09, 26 May 2022)
- Web Authentication (17:10, 26 May 2022)
- Medical Device (18:10, 27 May 2022)
- SBOM (18:55, 27 May 2022)
- WebAssembly (19:33, 27 May 2022)
- Chaos and Order (15:20, 29 May 2022)
- Second Law of Thermodynamics (16:13, 29 May 2022)
- Progressive Web App (16:18, 30 May 2022)
- Channel Binding (10:02, 31 May 2022)
- Key Exchange (10:28, 31 May 2022)
- Open Source Security (20:58, 31 May 2022)
- Cypherpunks (10:09, 1 June 2022)
- Verifier (07:42, 2 June 2022)
- Derived Credential (11:46, 3 June 2022)
- Derived Mobile Credential (06:13, 4 June 2022)
- Capability (19:28, 5 June 2022)
- Common Criteria (11:37, 7 June 2022)
- Hardware Protection (11:38, 7 June 2022)
- Consciousness (10:37, 10 June 2022)
- Empires of the Mind (16:51, 10 June 2022)
- Secure Payment Confirmation (12:14, 11 June 2022)
- Wallet (13:58, 11 June 2022)
- User Agent (15:27, 11 June 2022)
- Quantum Computing Threat (17:00, 11 June 2022)
- Web Share (10:41, 12 June 2022)
- Browser Origin Policy (10:45, 12 June 2022)
- Bitcoin (12:33, 14 June 2022)
- Native App (12:45, 14 June 2022)
- OpenID Connect Future (12:47, 14 June 2022)
- Technology Acceptance (17:16, 14 June 2022)
- Supply Chain (09:57, 15 June 2022)
- Identity (07:57, 19 June 2022)
- Health Credentials (09:19, 19 June 2022)
- Computing Machine (10:04, 19 June 2022)
- Mapping Purpose to Data Elements (16:50, 19 June 2022)
- JSON Web Proof (16:55, 19 June 2022)
- The Tragedy of the Commons (10:48, 20 June 2022)
- Private Property (11:01, 20 June 2022)
- Government (12:13, 20 June 2022)
- Phishing (12:24, 20 June 2022)
- EV Cert (12:24, 20 June 2022)
- Cross-Origin iFrame (13:12, 20 June 2022)
- Ecosystem (14:22, 20 June 2022)
- HIPAA Compliance Checklist (16:43, 21 June 2022)
- COVID Vaccination (16:46, 21 June 2022)
- Expiry (07:57, 22 June 2022)
- Learning Transfer (22:10, 26 June 2022)
- Privacy (13:29, 27 June 2022)
- User in Control (18:05, 1 July 2022)
- Symmetry and Equality (12:06, 2 July 2022)
- Artificial Consciousness (14:08, 2 July 2022)
- PHI (09:21, 3 July 2022)
- Policy Language (11:58, 3 July 2022)
- Usability (12:03, 3 July 2022)
- OIDC User Experience (12:47, 3 July 2022)
- Federation (12:49, 3 July 2022)
- Federation API (12:50, 3 July 2022)
- Federation Assurance Level 3 (12:51, 3 July 2022)
- Federation Trust Registry (12:51, 3 July 2022)
- Community and Privacy (17:00, 3 July 2022)