Pages with the fewest revisions

Jump to: navigation, search

Showing below up to 468 results in range #301 to #768.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Ephemeral‏‎ (8 revisions)
  2. Exonym‏‎ (8 revisions)
  3. FIDO UAF‏‎ (8 revisions)
  4. FedRamp‏‎ (8 revisions)
  5. HHS‏‎ (8 revisions)
  6. Mobile Driver's License with Reader‏‎ (8 revisions)
  7. Namespace‏‎ (8 revisions)
  8. Password‏‎ (8 revisions)
  9. Principal‏‎ (8 revisions)
  10. Rationality‏‎ (8 revisions)
  11. Recovery Use Case‏‎ (8 revisions)
  12. Role Based Access Control‏‎ (8 revisions)
  13. SCIM 2.0‏‎ (8 revisions)
  14. Security Boundary‏‎ (8 revisions)
  15. Security Guard Extensions‏‎ (8 revisions)
  16. Seeker‏‎ (8 revisions)
  17. Self-sovereign identities‏‎ (8 revisions)
  18. Sender Constrained Token‏‎ (8 revisions)
  19. Stability‏‎ (8 revisions)
  20. The Doors of Perception‏‎ (8 revisions)
  21. URN‏‎ (8 revisions)
  22. User Web Experience‏‎ (8 revisions)
  23. Background process‏‎ (9 revisions)
  24. Client‏‎ (9 revisions)
  25. Code of Hammurabi‏‎ (9 revisions)
  26. Consumer‏‎ (9 revisions)
  27. Digital Advertising‏‎ (9 revisions)
  28. Foreground process‏‎ (9 revisions)
  29. Free Speech‏‎ (9 revisions)
  30. Grant‏‎ (9 revisions)
  31. Intentionality‏‎ (9 revisions)
  32. Know Your Customer‏‎ (9 revisions)
  33. Legal Name‏‎ (9 revisions)
  34. NSTIC‏‎ (9 revisions)
  35. Payment Method as Identity Proof‏‎ (9 revisions)
  36. Resource Integrity‏‎ (9 revisions)
  37. Single Sign-On for Mobile Apps‏‎ (9 revisions)
  38. The Dark Forest‏‎ (9 revisions)
  39. Trust Link‏‎ (9 revisions)
  40. Unclonable Identifier‏‎ (9 revisions)
  41. Vulnerability‏‎ (9 revisions)
  42. Web View‏‎ (9 revisions)
  43. AML‏‎ (10 revisions)
  44. Apophenia‏‎ (10 revisions)
  45. Common Criteria‏‎ (10 revisions)
  46. Deploy MS SQL to AWS‏‎ (10 revisions)
  47. Derived Mobile Credential‏‎ (10 revisions)
  48. Digital Governance‏‎ (10 revisions)
  49. Digital Rights Management‏‎ (10 revisions)
  50. Distinguished Encoding Rules‏‎ (10 revisions)
  51. Encryption‏‎ (10 revisions)
  52. Explainer‏‎ (10 revisions)
  53. Factor Fight‏‎ (10 revisions)
  54. Federated Trust‏‎ (10 revisions)
  55. IIS URL Rewrite‏‎ (10 revisions)
  56. Identity Proofing‏‎ (10 revisions)
  57. Inconvenience‏‎ (10 revisions)
  58. Information Owner‏‎ (10 revisions)
  59. Mac Best Practice‏‎ (10 revisions)
  60. Meaning‏‎ (10 revisions)
  61. NFC‏‎ (10 revisions)
  62. Personal Information Agent‏‎ (10 revisions)
  63. Public Key Cryptography‏‎ (10 revisions)
  64. Security Event Token‏‎ (10 revisions)
  65. Smart Card‏‎ (10 revisions)
  66. The Cloud‏‎ (10 revisions)
  67. Trusted Third Party‏‎ (10 revisions)
  68. URI‏‎ (10 revisions)
  69. User Experience‏‎ (10 revisions)
  70. Vulture Capitalist‏‎ (10 revisions)
  71. Web App Manifest‏‎ (10 revisions)
  72. Web Platform Identifier‏‎ (10 revisions)
  73. Web Share‏‎ (10 revisions)
  74. Web Site‏‎ (10 revisions)
  75. Xamarin Forms‏‎ (10 revisions)
  76. Authentication Protocols‏‎ (11 revisions)
  77. Birds‏‎ (11 revisions)
  78. Browser Origin Policy‏‎ (11 revisions)
  79. CDN‏‎ (11 revisions)
  80. California Consumer Privacy Act of 2018‏‎ (11 revisions)
  81. Change Password‏‎ (11 revisions)
  82. Consent Receipt Construction‏‎ (11 revisions)
  83. Deploy .NET to Windows‏‎ (11 revisions)
  84. Differential Privacy‏‎ (11 revisions)
  85. Digital Fingerprint‏‎ (11 revisions)
  86. Feynman Least Action Thesis‏‎ (11 revisions)
  87. Herd Privacy‏‎ (11 revisions)
  88. Human-centered Design‏‎ (11 revisions)
  89. Identity Model Overview‏‎ (11 revisions)
  90. NIST SP 800-63-3C‏‎ (11 revisions)
  91. National Law Enforcement Telecommunications System (NLETS)‏‎ (11 revisions)
  92. Privacy Enhancing Technology Provider‏‎ (11 revisions)
  93. Redirect‏‎ (11 revisions)
  94. Security Token‏‎ (11 revisions)
  95. Suite B‏‎ (11 revisions)
  96. To Trust or not to Trust‏‎ (11 revisions)
  97. Transparency‏‎ (11 revisions)
  98. Trusted Internet Connection‏‎ (11 revisions)
  99. Attaks on Privacy‏‎ (12 revisions)
  100. Authorization Request‏‎ (12 revisions)
  101. Base64‏‎ (12 revisions)
  102. Common Sense‏‎ (12 revisions)
  103. FIPS 140‏‎ (12 revisions)
  104. Framework Profile‏‎ (12 revisions)
  105. HIPAA Compliance Checklist‏‎ (12 revisions)
  106. Native User Agent‏‎ (12 revisions)
  107. Redress‏‎ (12 revisions)
  108. SameSite‏‎ (12 revisions)
  109. Subject Key ID‏‎ (12 revisions)
  110. User in Control‏‎ (12 revisions)
  111. VICAL‏‎ (12 revisions)
  112. Validated‏‎ (12 revisions)
  113. Verified Claim‏‎ (12 revisions)
  114. Wallet Deployments‏‎ (12 revisions)
  115. Biometric Identifier‏‎ (13 revisions)
  116. Compliance‏‎ (13 revisions)
  117. Contract of Adhesion‏‎ (13 revisions)
  118. InfoCard‏‎ (13 revisions)
  119. Internet Bill of Rights‏‎ (13 revisions)
  120. Late Binding Token‏‎ (13 revisions)
  121. Machine Learning‏‎ (13 revisions)
  122. Ontology‏‎ (13 revisions)
  123. Payment Request‏‎ (13 revisions)
  124. Persona‏‎ (13 revisions)
  125. Privacy Enhancing Credential‏‎ (13 revisions)
  126. Reification‏‎ (13 revisions)
  127. Relying Party‏‎ (13 revisions)
  128. Resource‏‎ (13 revisions)
  129. Revocation‏‎ (13 revisions)
  130. Self-issued OpenID Provider‏‎ (13 revisions)
  131. Self-issued Reconnection‏‎ (13 revisions)
  132. Trust Registry Identifier‏‎ (13 revisions)
  133. User‏‎ (13 revisions)
  134. Verifiable Presentation‏‎ (13 revisions)
  135. Virtual Private Network‏‎ (13 revisions)
  136. Access Control‏‎ (14 revisions)
  137. Authentication Cookie‏‎ (14 revisions)
  138. Browser‏‎ (14 revisions)
  139. Consent to Create Binding‏‎ (14 revisions)
  140. Corroborated‏‎ (14 revisions)
  141. Credential Management‏‎ (14 revisions)
  142. Deploy .NET to Docker‏‎ (14 revisions)
  143. Derived Credential‏‎ (14 revisions)
  144. Explanation‏‎ (14 revisions)
  145. Federation API‏‎ (14 revisions)
  146. Government‏‎ (14 revisions)
  147. Healthcare Code of Conduct‏‎ (14 revisions)
  148. Identity Theft‏‎ (14 revisions)
  149. Indistinguishability Obfuscation‏‎ (14 revisions)
  150. NIST SP 800-63-3‏‎ (14 revisions)
  151. Notification‏‎ (14 revisions)
  152. Object Permanence‏‎ (14 revisions)
  153. Policy Language‏‎ (14 revisions)
  154. Privacy Regulation‏‎ (14 revisions)
  155. Private Property‏‎ (14 revisions)
  156. User Information‏‎ (14 revisions)
  157. User Intent‏‎ (14 revisions)
  158. User Name‏‎ (14 revisions)
  159. Zenkey App‏‎ (14 revisions)
  160. Abstract Thinking‏‎ (15 revisions)
  161. Data Controller‏‎ (15 revisions)
  162. Entropy‏‎ (15 revisions)
  163. Fraud Detection‏‎ (15 revisions)
  164. Health Credentials‏‎ (15 revisions)
  165. Hundred Points of Light‏‎ (15 revisions)
  166. Induction‏‎ (15 revisions)
  167. Information Sharing‏‎ (15 revisions)
  168. Innovation‏‎ (15 revisions)
  169. Intelligent Tracking Prevention‏‎ (15 revisions)
  170. Mobile Driver's License with WebAPI‏‎ (15 revisions)
  171. Notice‏‎ (15 revisions)
  172. ONAP‏‎ (15 revisions)
  173. One-Time Password Authenticator‏‎ (15 revisions)
  174. Passenger Name Record‏‎ (15 revisions)
  175. Subject Identifier‏‎ (15 revisions)
  176. User Choice Experience‏‎ (15 revisions)
  177. Verification‏‎ (15 revisions)
  178. Web Site Identity‏‎ (15 revisions)
  179. Attention‏‎ (16 revisions)
  180. Fuzzy Logic‏‎ (16 revisions)
  181. Identifier Standards‏‎ (16 revisions)
  182. Laws of Security‏‎ (16 revisions)
  183. Linux‏‎ (16 revisions)
  184. Mobile Security‏‎ (16 revisions)
  185. Persistent‏‎ (16 revisions)
  186. Token Binding‏‎ (16 revisions)
  187. Web Payments‏‎ (16 revisions)
  188. Add to Home Screen‏‎ (17 revisions)
  189. Artificial Consciousness‏‎ (17 revisions)
  190. Determinism‏‎ (17 revisions)
  191. Intelligent Goals‏‎ (17 revisions)
  192. Internet of Things‏‎ (17 revisions)
  193. Permanent Identity Underclass‏‎ (17 revisions)
  194. Permissioned Blockchain‏‎ (17 revisions)
  195. Photon‏‎ (17 revisions)
  196. Privacy as the Enemy‏‎ (17 revisions)
  197. Synthetic Identity‏‎ (17 revisions)
  198. Web App‏‎ (17 revisions)
  199. Wisdom‏‎ (17 revisions)
  200. Authorization Code‏‎ (18 revisions)
  201. Blockchain Privacy‏‎ (18 revisions)
  202. Category‏‎ (18 revisions)
  203. Cybersecurity‏‎ (18 revisions)
  204. HTTPS Connection Issues‏‎ (18 revisions)
  205. Hunting‏‎ (18 revisions)
  206. Mobile Advertising ID‏‎ (18 revisions)
  207. Native App URI Handlers‏‎ (18 revisions)
  208. PKCS 12‏‎ (18 revisions)
  209. Trust Service‏‎ (18 revisions)
  210. Utopia‏‎ (18 revisions)
  211. CARIN App Registration‏‎ (19 revisions)
  212. Cryptography‏‎ (19 revisions)
  213. OpenID in Smartphones‏‎ (19 revisions)
  214. Presence‏‎ (19 revisions)
  215. Risk Analysis‏‎ (19 revisions)
  216. Social Contract‏‎ (19 revisions)
  217. Trusted Browser‏‎ (19 revisions)
  218. Web Authentication Levels‏‎ (19 revisions)
  219. DNS‏‎ (20 revisions)
  220. Distributed Consistency‏‎ (20 revisions)
  221. Domain‏‎ (20 revisions)
  222. Intelligent Design‏‎ (20 revisions)
  223. Smart Health IT‏‎ (20 revisions)
  224. The Internet as Spoiled Child‏‎ (20 revisions)
  225. The Ones Who Walk Away‏‎ (20 revisions)
  226. Typescript‏‎ (20 revisions)
  227. Civil Society‏‎ (21 revisions)
  228. Compliant Implementation of RP on ASP.NET‏‎ (21 revisions)
  229. Culture‏‎ (21 revisions)
  230. Exceptional Access‏‎ (21 revisions)
  231. Privacy in an Emergency‏‎ (21 revisions)
  232. Recovery‏‎ (21 revisions)
  233. Risk Management‏‎ (21 revisions)
  234. Technology Solution‏‎ (21 revisions)
  235. Trusted Identifiers in Cyberspace‏‎ (21 revisions)
  236. Wild Card Certificates‏‎ (21 revisions)
  237. Device Management‏‎ (22 revisions)
  238. JWT‏‎ (22 revisions)
  239. Personal Information Economics‏‎ (22 revisions)
  240. Public Key Infrastructure‏‎ (22 revisions)
  241. Trusted First Party‏‎ (22 revisions)
  242. Truth‏‎ (22 revisions)
  243. Chaos and Order‏‎ (23 revisions)
  244. Decentralized Identifier‏‎ (23 revisions)
  245. FirstNet‏‎ (23 revisions)
  246. Mind‏‎ (23 revisions)
  247. Proof Key for Code Exchange‏‎ (23 revisions)
  248. Publicly Accessible Data and Code‏‎ (23 revisions)
  249. SBOM‏‎ (23 revisions)
  250. Signing‏‎ (23 revisions)
  251. Simplicity‏‎ (23 revisions)
  252. URL‏‎ (23 revisions)
  253. User Tracking‏‎ (23 revisions)
  254. Biometric Attribute‏‎ (24 revisions)
  255. Consciousness‏‎ (24 revisions)
  256. Cybersecurity Must Be Free‏‎ (24 revisions)
  257. Decentralized Resource Identifier‏‎ (24 revisions)
  258. Digital object identifier‏‎ (24 revisions)
  259. EV Cert‏‎ (24 revisions)
  260. Hardware Protection‏‎ (24 revisions)
  261. Security‏‎ (24 revisions)
  262. Self-signed Certificate‏‎ (24 revisions)
  263. TSA Logistics‏‎ (24 revisions)
  264. Channel Binding‏‎ (25 revisions)
  265. Community and Privacy‏‎ (25 revisions)
  266. Information‏‎ (25 revisions)
  267. Nodal Point‏‎ (25 revisions)
  268. Persistent Connection Management‏‎ (25 revisions)
  269. Presentation from a Wallet‏‎ (25 revisions)
  270. Trust in Financial Institutions‏‎ (25 revisions)
  271. Trusted Location‏‎ (25 revisions)
  272. User-centric Consent‏‎ (25 revisions)
  273. User Private Information‏‎ (25 revisions)
  274. Accreditation Service‏‎ (26 revisions)
  275. Authorization‏‎ (26 revisions)
  276. Bound Token‏‎ (26 revisions)
  277. Democracy‏‎ (26 revisions)
  278. EHR‏‎ (26 revisions)
  279. Expiry‏‎ (26 revisions)
  280. GDPR‏‎ (26 revisions)
  281. Let's Encrypt‏‎ (26 revisions)
  282. OAuth 2.0‏‎ (26 revisions)
  283. Semantics‏‎ (26 revisions)
  284. Subject ID‏‎ (26 revisions)
  285. Authentication Factor‏‎ (27 revisions)
  286. Bearer Token‏‎ (27 revisions)
  287. FHIR‏‎ (27 revisions)
  288. Identifying Returning Users‏‎ (27 revisions)
  289. Information wants to be Free‏‎ (27 revisions)
  290. Machine Readable Governance‏‎ (27 revisions)
  291. Apps on User Devices‏‎ (28 revisions)
  292. Compliant Implementation of Native User Agent‏‎ (28 revisions)
  293. Disruption‏‎ (28 revisions)
  294. Distributed Identity‏‎ (28 revisions)
  295. First-Party Set‏‎ (28 revisions)
  296. HTTP/3‏‎ (28 revisions)
  297. Main Page‏‎ (28 revisions)
  298. Sidetree‏‎ (28 revisions)
  299. Smart Health Card‏‎ (28 revisions)
  300. Trust Vector‏‎ (28 revisions)
  301. Trusted Computing‏‎ (28 revisions)
  302. Browser Identity Interactions‏‎ (29 revisions)
  303. Ion ID‏‎ (29 revisions)
  304. Self-Sovereign Identity‏‎ (29 revisions)
  305. Anarchy‏‎ (30 revisions)
  306. Building a Wiki‏‎ (30 revisions)
  307. Creative Destruction‏‎ (30 revisions)
  308. Federation‏‎ (30 revisions)
  309. Financial User Consent‏‎ (30 revisions)
  310. Governance Framework‏‎ (30 revisions)
  311. Healthcare Write-back‏‎ (30 revisions)
  312. Identifier or Attribute Provider‏‎ (30 revisions)
  313. PHI‏‎ (30 revisions)
  314. Smartphone Wireless‏‎ (30 revisions)
  315. Identifier use in Browsers‏‎ (31 revisions)
  316. Private Key Component‏‎ (31 revisions)
  317. User Agent‏‎ (31 revisions)
  318. Verifier‏‎ (31 revisions)
  319. Vulnerable Community‏‎ (31 revisions)
  320. Capitalism‏‎ (32 revisions)
  321. Quantum Computing Threat‏‎ (32 revisions)
  322. Verified Wallet‏‎ (32 revisions)
  323. Ball Park Ticket Taker‏‎ (33 revisions)
  324. Best Practice and Example Identifier Provider‏‎ (33 revisions)
  325. Best Practice in HealthCare‏‎ (33 revisions)
  326. Chance and Necessity‏‎ (33 revisions)
  327. Internet Security‏‎ (33 revisions)
  328. Publish Project to AWS‏‎ (33 revisions)
  329. Shared Data Protection‏‎ (33 revisions)
  330. Authentication UX‏‎ (34 revisions)
  331. Ecosystem‏‎ (34 revisions)
  332. Service Worker‏‎ (34 revisions)
  333. State Mandated Identification‏‎ (34 revisions)
  334. WebID Comparison‏‎ (34 revisions)
  335. Attested‏‎ (35 revisions)
  336. Attribute‏‎ (35 revisions)
  337. Claim‏‎ (35 revisions)
  338. FIDO U2F‏‎ (35 revisions)
  339. Health Care Identity Management‏‎ (35 revisions)
  340. IIS as Reverse Proxy‏‎ (35 revisions)
  341. Multi-factor Authentication‏‎ (35 revisions)
  342. Notary Seal‏‎ (35 revisions)
  343. Verified Information‏‎ (35 revisions)
  344. Conduct Risk‏‎ (36 revisions)
  345. Digital Signature‏‎ (36 revisions)
  346. Mobile Driver's License with OIDC‏‎ (36 revisions)
  347. Modeling Ecosystems‏‎ (36 revisions)
  348. Notice-centric ID‏‎ (36 revisions)
  349. PWA initiators‏‎ (36 revisions)
  350. Privacy Risk‏‎ (36 revisions)
  351. Protocol Handler‏‎ (36 revisions)
  352. User Object‏‎ (36 revisions)
  353. Verifiable Credential‏‎ (36 revisions)
  354. Key Store‏‎ (37 revisions)
  355. Native App‏‎ (37 revisions)
  356. User Trust of a Web Site‏‎ (37 revisions)
  357. Consent Management‏‎ (38 revisions)
  358. Consent Manifesto‏‎ (38 revisions)
  359. Self-issued Identifier‏‎ (38 revisions)
  360. Bayesian Identity Proofing‏‎ (39 revisions)
  361. Chaotic User Experience‏‎ (39 revisions)
  362. Identity Management‏‎ (39 revisions)
  363. Identity Pathology‏‎ (39 revisions)
  364. Resilience‏‎ (39 revisions)
  365. Security Information and Event Management‏‎ (39 revisions)
  366. Web Authentication‏‎ (39 revisions)
  367. Pseudonym‏‎ (40 revisions)
  368. Self-issued Trust‏‎ (40 revisions)
  369. WebAuthn 2‏‎ (40 revisions)
  370. Design Pattern‏‎ (41 revisions)
  371. GDPR Avoidance‏‎ (41 revisions)
  372. Native App Privacy‏‎ (41 revisions)
  373. Smartphone Identity‏‎ (41 revisions)
  374. TEFCA‏‎ (41 revisions)
  375. Threat Model‏‎ (41 revisions)
  376. Vaccination Credential Initiative‏‎ (41 revisions)
  377. Web Site Security‏‎ (41 revisions)
  378. Consent for Mobile Credentials‏‎ (42 revisions)
  379. Deploy .NET to AWS‏‎ (42 revisions)
  380. Scope‏‎ (42 revisions)
  381. API‏‎ (43 revisions)
  382. Best Practice and Example Relying Party‏‎ (43 revisions)
  383. Executive Order on Cybersecurity‏‎ (43 revisions)
  384. Medical Records Identifier‏‎ (43 revisions)
  385. Wallet User Experience‏‎ (43 revisions)
  386. Anonymous‏‎ (44 revisions)
  387. Bootstrapping Identity and Consent‏‎ (44 revisions)
  388. Credential Aggregation‏‎ (44 revisions)
  389. Data Controller Options‏‎ (44 revisions)
  390. OpenID Connect‏‎ (44 revisions)
  391. Patient Credential‏‎ (44 revisions)
  392. Authenticator‏‎ (46 revisions)
  393. Identity Ecosystem‏‎ (46 revisions)
  394. Presentation Experience‏‎ (46 revisions)
  395. Personal Privacy‏‎ (47 revisions)
  396. ASN.1‏‎ (48 revisions)
  397. Consent‏‎ (48 revisions)
  398. Health Care Native Application‏‎ (48 revisions)
  399. Federated Learning‏‎ (49 revisions)
  400. Federation Assurance Level 3‏‎ (49 revisions)
  401. Policy-Based Access Control‏‎ (49 revisions)
  402. Progressive Web App‏‎ (49 revisions)
  403. Distributed ID‏‎ (51 revisions)
  404. Microsoft Identity Platform‏‎ (51 revisions)
  405. Purpose for Access Request‏‎ (51 revisions)
  406. Verifiable Cred V1.1 Normative‏‎ (51 revisions)
  407. User Consent‏‎ (52 revisions)
  408. Credential‏‎ (53 revisions)
  409. Trusted Identifier‏‎ (53 revisions)
  410. Verifiable Claim‏‎ (53 revisions)
  411. Decentralized ID‏‎ (55 revisions)
  412. Common Good‏‎ (56 revisions)
  413. Digital Asset‏‎ (57 revisions)
  414. Identity Model‏‎ (57 revisions)
  415. Did:orb‏‎ (58 revisions)
  416. Framework‏‎ (58 revisions)
  417. Identifier‏‎ (58 revisions)
  418. Smartphone‏‎ (58 revisions)
  419. Best Practice and Example Trust Registry‏‎ (59 revisions)
  420. Universal Serial Bus (USB)‏‎ (59 revisions)
  421. Web ID‏‎ (59 revisions)
  422. Assurance‏‎ (60 revisions)
  423. User Stipulation‏‎ (60 revisions)
  424. Complexity‏‎ (62 revisions)
  425. Homeostasis‏‎ (64 revisions)
  426. InterPlanetary File System‏‎ (65 revisions)
  427. Open Banking‏‎ (65 revisions)
  428. Entity Statement‏‎ (66 revisions)
  429. Patient Experience‏‎ (66 revisions)
  430. Zero Trust Architecture‏‎ (66 revisions)
  431. Bearer Tokens Considered Harmful‏‎ (70 revisions)
  432. Mobile Driver's License Presentation‏‎ (74 revisions)
  433. Health Care Native App Example‏‎ (75 revisions)
  434. COVID Vaccination‏‎ (76 revisions)
  435. Identity Taxonomy‏‎ (77 revisions)
  436. Ethics‏‎ (78 revisions)
  437. Progressive Authentication‏‎ (78 revisions)
  438. Open Source Security‏‎ (79 revisions)
  439. Software Statement‏‎ (80 revisions)
  440. Supply Chain‏‎ (82 revisions)
  441. Health Care Digital Identity‏‎ (86 revisions)
  442. Federated Ecosystem‏‎ (87 revisions)
  443. X.509 Certificate‏‎ (87 revisions)
  444. Evolution‏‎ (94 revisions)
  445. Docker‏‎ (95 revisions)
  446. Best Practice and Example Self-issued Identifier‏‎ (96 revisions)
  447. Right to be Forgotten‏‎ (96 revisions)
  448. Proof of Presence‏‎ (97 revisions)
  449. Artificial Intelligence‏‎ (98 revisions)
  450. Native App Security‏‎ (98 revisions)
  451. Trusted Execution Environment‏‎ (100 revisions)
  452. GDPR is a scam‏‎ (102 revisions)
  453. Self-issued OpenID Picker‏‎ (106 revisions)
  454. Identity‏‎ (116 revisions)
  455. Federation Trust Registry‏‎ (117 revisions)
  456. Wallet‏‎ (117 revisions)
  457. Blockchain‏‎ (119 revisions)
  458. Knowledge‏‎ (124 revisions)
  459. Consent Receipt‏‎ (126 revisions)
  460. Power of Passengers‏‎ (132 revisions)
  461. Cross-Origin iFrame‏‎ (133 revisions)
  462. Mobile Driver's License‏‎ (151 revisions)
  463. Authentication Providers‏‎ (154 revisions)
  464. Cookies‏‎ (155 revisions)
  465. General Theory of Living Systems‏‎ (172 revisions)
  466. Eventful Universe‏‎ (184 revisions)
  467. Privacy‏‎ (244 revisions)
  468. Trust‏‎ (261 revisions)

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)