Pages with the fewest revisions
Showing below up to 250 results in range #1 to #250.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- ASP.NET Security (2 revisions)
- Access Token (2 revisions)
- Account Takeover (2 revisions)
- Anthropocentrism (2 revisions)
- Application Lifecycle (2 revisions)
- Assembly Theory (2 revisions)
- Asynchronous (2 revisions)
- B2B (2 revisions)
- Baseline Functional Requirements (2 revisions)
- Best Practice .NET MAUI (2 revisions)
- Best Practice Apple (2 revisions)
- Best Practice in Finance (2 revisions)
- C2B (2 revisions)
- CBOR (2 revisions)
- Capability (2 revisions)
- Carbon-based Life Form (2 revisions)
- Causality (2 revisions)
- Circles (2 revisions)
- Computer Architect (2 revisions)
- Connecting to a Mac from a Windows PC (2 revisions)
- Content Authenticity Initiative (2 revisions)
- Cryptographic Modules (2 revisions)
- Cypherpunks (2 revisions)
- DISA (2 revisions)
- Develop .NET 5.0 (2 revisions)
- Device Access Control (2 revisions)
- Did-self (2 revisions)
- Digital Presentation (2 revisions)
- Distributed Ledger Technology (2 revisions)
- Docker Container with Visual Studio Code (2 revisions)
- EHI (2 revisions - redirect page)
- EUDI Wallet (2 revisions)
- EU Data Act (2 revisions)
- Electronic Data Interchange (2 revisions)
- Enterprise (2 revisions)
- Entity (2 revisions)
- Ethlas (2 revisions)
- Evolutionary Epistemology (2 revisions)
- FTC Section 5 (2 revisions)
- FedNOW (2 revisions)
- Federation Service (2 revisions - redirect page)
- Frontend only Authorization (2 revisions)
- GUID (2 revisions)
- Glossary (2 revisions)
- GoLang (2 revisions)
- Hashed Password (2 revisions)
- Holder (2 revisions)
- Human Colossus Foundation (2 revisions)
- Human Computer Interaction (2 revisions)
- ID Token (2 revisions)
- IP address (2 revisions)
- Identity Spoofing (2 revisions)
- Impersonation (2 revisions)
- Information Accumulation (2 revisions)
- JSON Web Proof (2 revisions)
- Kantara Initiative (2 revisions)
- Liability (2 revisions)
- Linux UX (2 revisions)
- Medical Device (2 revisions)
- Medical eConsent (2 revisions)
- Memory Safe (2 revisions)
- Minimum Viable Secure Product (2 revisions)
- Mobile Driver's License with NIST (2 revisions)
- Mosip (2 revisions)
- Mutual Authentication (2 revisions)
- NFT (2 revisions)
- Numbers (2 revisions)
- OIDC User Experience (2 revisions)
- OP (2 revisions - redirect page)
- OpenID Apps (2 revisions)
- OpenID Provider (2 revisions)
- Open Secure Device Protocol (2 revisions)
- PGP (2 revisions)
- PQ3 (2 revisions)
- Password Manager (2 revisions)
- Patient Monitoring (2 revisions)
- Payment on Apple (2 revisions)
- Price of Anarchy (2 revisions)
- Promise and Task (2 revisions)
- REST (2 revisions)
- Real Name (2 revisions)
- SSH (2 revisions)
- Secure Browser (2 revisions)
- Secure Enclave (2 revisions)
- Selective Retention (2 revisions)
- Service Design (2 revisions)
- Silicon-based Life Form (2 revisions)
- Social Media (2 revisions)
- Standardization documents from ISO IEC CEN Cenelec ETSI (2 revisions)
- Syncable Authenticator (2 revisions)
- Syntax (2 revisions)
- U2F Financial (2 revisions)
- UMA (2 revisions - redirect page)
- Universal ID (2 revisions)
- Utility Function (2 revisions)
- Will To Power (2 revisions)
- World ID (2 revisions)
- Address as Identity Proof (3 revisions)
- Apple Wallet (3 revisions)
- Artifact (3 revisions)
- Automaton (3 revisions)
- Ball Park Ticket Acquisition (3 revisions)
- Banking as a Service (3 revisions)
- Best Practice MS SQL (3 revisions)
- Bounce Tracking (3 revisions)
- Business (3 revisions)
- Chromium for Windows (3 revisions)
- Computation (3 revisions)
- Computational Law (3 revisions)
- Convergence (3 revisions)
- Cyber (3 revisions)
- Dark Energy (3 revisions)
- Data Category (3 revisions)
- Data Minimization (3 revisions)
- Deploy .NET to Azure (3 revisions)
- Direct Presentation (3 revisions)
- Domain Name (3 revisions)
- EBSI (3 revisions)
- ESG (3 revisions)
- Eliza (3 revisions)
- Emptiness (3 revisions)
- End to End Encryption (3 revisions)
- Executive Order 14028 (3 revisions)
- FIDO Device Onboarding (3 revisions)
- Fates (3 revisions)
- Federated Identifier (3 revisions)
- Guardianship (3 revisions)
- HTTP/2 (3 revisions)
- Healthcare Profile (3 revisions)
- Healthcare Sources (3 revisions)
- IDEF (3 revisions)
- Identifier and Access Management (3 revisions)
- Identity Ecosystem Framework (3 revisions)
- KERI (3 revisions)
- Microsoft RAMP (3 revisions)
- NIST SP 800-63-4 (3 revisions)
- Network Address (3 revisions)
- Network Protocol (3 revisions)
- Neuromorphic Computing (3 revisions)
- OCSP (3 revisions)
- OIDC (3 revisions)
- OODA (3 revisions)
- Ontic (3 revisions)
- OpenPubKey (3 revisions)
- OpenSSL (3 revisions)
- Personal Identifier (3 revisions)
- Privacy in Mobile Credentials (3 revisions)
- Prompt Fatigue (3 revisions)
- Public Health (3 revisions)
- Red Cross Emblem (3 revisions)
- Relying Party Authentication Use Case (3 revisions)
- Remote Attestation (3 revisions)
- Role (3 revisions)
- Sensible Reality (3 revisions)
- Simulated Reality (3 revisions)
- Single Sign-On (3 revisions)
- Small Business Administration (3 revisions)
- Strong Authentication and Identity Workshop (3 revisions)
- Threshold Key Agreement (3 revisions)
- Trust Evaluation (3 revisions)
- Trust Registry (3 revisions - redirect page)
- Trusted Resolver (3 revisions)
- Trusted Root (3 revisions)
- Trustworthy Computing (3 revisions)
- Underserved Communities (3 revisions)
- User Managed Access (3 revisions)
- ViaCrypt (3 revisions)
- Virtual Realty (3 revisions)
- Von Neumann Bottleneck (3 revisions)
- Wave Packet (3 revisions)
- WebAssembly (3 revisions)
- X.590 Signature (3 revisions)
- Agent-Human Collaboration (4 revisions)
- Apple iOS User Client Apps (4 revisions)
- Brain (4 revisions)
- COPPA (4 revisions)
- Common Viewer Air System (4 revisions)
- Compliant Implementation of Trust Registry (4 revisions)
- Confidential Computing (4 revisions)
- Consensus Protocols (4 revisions)
- Content Addressable Storage (4 revisions)
- Content Security Policy (4 revisions)
- Cybernetics (4 revisions)
- DFARS (4 revisions)
- Decentralized Finance (4 revisions)
- Deploy App to Android (4 revisions)
- Developing with MS SQL (4 revisions)
- Digital Forensics (4 revisions)
- Digital Identifier (4 revisions)
- Digital Identity Testbed (4 revisions)
- Distinguished Name (4 revisions)
- Divergence (4 revisions)
- Domain Name System (4 revisions)
- EdDSA (4 revisions)
- Emergency Identifier (4 revisions)
- Enterprise Mobile Management (4 revisions)
- Equilibrium (4 revisions)
- Fenced Frames (4 revisions)
- Formal Model (4 revisions)
- Genetic Programming (4 revisions)
- Global Business Identifiers (4 revisions)
- Google Healthcare (4 revisions)
- Hardware-Enabled Security (4 revisions)
- Health Information Network (4 revisions)
- ICAO DTC (4 revisions)
- Identity and Access Management (4 revisions)
- Identity as a Service (4 revisions)
- Indicators of Compromise (4 revisions)
- Information Age (4 revisions)
- Instant Payments (4 revisions)
- Isolated Web App (4 revisions)
- Kerberos (4 revisions)
- Loyalty ID (4 revisions)
- Machine Readable Document (4 revisions)
- Mapping Purpose to Data Elements (4 revisions)
- Metadata Design Pattern (4 revisions)
- Metaverse (4 revisions)
- Mobile Credential (4 revisions)
- Natural Person (4 revisions)
- Network Address Translation (4 revisions)
- Oblivious HTTP (4 revisions)
- On Truth and Falsehood (4 revisions)
- PEM (4 revisions)
- Peer-to-Peer Network (4 revisions)
- Ponzi Scheme (4 revisions)
- Pop-up Window (4 revisions)
- Privacy Hides Crimes (4 revisions)
- Property (4 revisions)
- Real Identifier (4 revisions)
- Remote. Access (4 revisions)
- Remote Identification (4 revisions)
- Risk Tolerance (4 revisions)
- Router (4 revisions)
- Rule of Law (4 revisions)
- SIMPLE (4 revisions)
- STRIDE (4 revisions)
- Security Risk (4 revisions)
- Simultaneity (4 revisions)
- Smart Credentals (4 revisions)
- Stupidity (4 revisions)
- Surface Book 3 (4 revisions)
- System for Cross-domain Identity Management (4 revisions)
- Troubleshoot ASP.NET (4 revisions)
- Use Case (4 revisions)
- User Public Information (4 revisions)
- User Risk (4 revisions)
- Validating Personal Information (4 revisions)
- Wavelet (4 revisions)
- Windows Vulnerabilities (4 revisions)
- World Wide Web (4 revisions)