Pages with the fewest revisions

Jump to: navigation, search

Showing below up to 375 results in range #51 to #425.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. FIPS 140‏‎ (3 revisions)
  2. Government‏‎ (3 revisions)
  3. IDEF‏‎ (3 revisions)
  4. Identity Ecosystem Framework‏‎ (3 revisions)
  5. Information Age‏‎ (3 revisions)
  6. Network Address Translation‏‎ (3 revisions)
  7. Personal Identifier‏‎ (3 revisions)
  8. Refresh Token‏‎ (3 revisions)
  9. Relying Party Authentication Use Case‏‎ (3 revisions)
  10. Role‏‎ (3 revisions)
  11. Strong Authentication and Identity Workshop‏‎ (3 revisions)
  12. Strong Customer Authentication‏‎ (3 revisions)
  13. Trust Registry‏‎ (3 revisions - redirect page)
  14. Trusted Resolver‏‎ (3 revisions)
  15. Trusted Root‏‎ (3 revisions)
  16. Web Platform Identifier‏‎ (3 revisions)
  17. ASN.1‏‎ (4 revisions)
  18. Brain‏‎ (4 revisions)
  19. COPPA‏‎ (4 revisions)
  20. Client‏‎ (4 revisions)
  21. Compliant Implementation of Trust Registry‏‎ (4 revisions)
  22. Content Addressable Storage‏‎ (4 revisions)
  23. Credential Service Provider‏‎ (4 revisions)
  24. Deploy App to Android‏‎ (4 revisions)
  25. Developing with MS SQL‏‎ (4 revisions)
  26. Global Business Identifiers‏‎ (4 revisions)
  27. Health Information Network‏‎ (4 revisions)
  28. IIS Security Practices‏‎ (4 revisions)
  29. Identity Ecosystem‏‎ (4 revisions)
  30. Lorem ipsum‏‎ (4 revisions)
  31. Natural Person‏‎ (4 revisions)
  32. Node.js‏‎ (4 revisions)
  33. Personally Identifiable Information‏‎ (4 revisions)
  34. Real Identifier‏‎ (4 revisions)
  35. Rule of Law‏‎ (4 revisions)
  36. SAML 2.0‏‎ (4 revisions)
  37. Security Guard Extensions‏‎ (4 revisions)
  38. Signing on Server‏‎ (4 revisions)
  39. Smart Credentals‏‎ (4 revisions)
  40. System for Cross-domain Identity Management‏‎ (4 revisions)
  41. Use Case‏‎ (4 revisions)
  42. User Public Information‏‎ (4 revisions)
  43. Binding‏‎ (5 revisions)
  44. Biometric Identifier‏‎ (5 revisions)
  45. Ceremony‏‎ (5 revisions)
  46. DNS‏‎ (5 revisions)
  47. Federal Government IT Intentions‏‎ (5 revisions)
  48. IPV6‏‎ (5 revisions)
  49. Inference‏‎ (5 revisions)
  50. Intentionality‏‎ (5 revisions)
  51. Notice‏‎ (5 revisions)
  52. OpenID Connect Future‏‎ (5 revisions)
  53. Open Source Software‏‎ (5 revisions)
  54. Provenance‏‎ (5 revisions)
  55. Safe Browsing‏‎ (5 revisions)
  56. Secret Key Cryptography‏‎ (5 revisions)
  57. Secure Node‏‎ (5 revisions)
  58. Sidetree‏‎ (5 revisions)
  59. Site‏‎ (5 revisions)
  60. Tribal Identifier‏‎ (5 revisions)
  61. Unclonable Identity‏‎ (5 revisions)
  62. Universal Resolver‏‎ (5 revisions)
  63. User Device‏‎ (5 revisions)
  64. Verifiable Credential‏‎ (5 revisions)
  65. Windows Group Policy‏‎ (5 revisions)
  66. Windows Services‏‎ (5 revisions)
  67. Artificial Identifier‏‎ (6 revisions)
  68. Authentication‏‎ (6 revisions)
  69. Behavior‏‎ (6 revisions)
  70. Fake Identifier‏‎ (6 revisions)
  71. Legal Person‏‎ (6 revisions)
  72. NFC‏‎ (6 revisions)
  73. PSD2‏‎ (6 revisions)
  74. Payment Method as Identity Proof‏‎ (6 revisions)
  75. Presentation‏‎ (6 revisions)
  76. Problem Solving‏‎ (6 revisions)
  77. Security Information and Event Management‏‎ (6 revisions)
  78. Self-sovereign identities‏‎ (6 revisions)
  79. Tails‏‎ (6 revisions)
  80. Transparency‏‎ (6 revisions)
  81. Vulnerable Identifier‏‎ (6 revisions)
  82. A/B Testing‏‎ (7 revisions)
  83. Conformity‏‎ (7 revisions)
  84. Cryptography‏‎ (7 revisions)
  85. Differential Privacy‏‎ (7 revisions)
  86. Digital Rights Management‏‎ (7 revisions)
  87. JOSE‏‎ (7 revisions)
  88. Payment Request‏‎ (7 revisions)
  89. Public Key Cryptography‏‎ (7 revisions)
  90. Recovery Use Case‏‎ (7 revisions)
  91. Risk Management‏‎ (7 revisions)
  92. Subject‏‎ (7 revisions)
  93. Trusted Third Party‏‎ (7 revisions)
  94. User Web Experience‏‎ (7 revisions)
  95. Verifiable Presentation‏‎ (7 revisions)
  96. ASCII‏‎ (8 revisions)
  97. Data Controller‏‎ (8 revisions)
  98. Dualism‏‎ (8 revisions)
  99. Ephemeral‏‎ (8 revisions)
  100. FIDO UAF‏‎ (8 revisions)
  101. Grant‏‎ (8 revisions)
  102. Linux‏‎ (8 revisions)
  103. NSTIC‏‎ (8 revisions)
  104. Password‏‎ (8 revisions)
  105. Principal‏‎ (8 revisions)
  106. Relying Party‏‎ (8 revisions)
  107. SCIM 2.0‏‎ (8 revisions)
  108. Security Boundary‏‎ (8 revisions)
  109. Sender Constrained Token‏‎ (8 revisions)
  110. Stability‏‎ (8 revisions)
  111. The Doors of Perception‏‎ (8 revisions)
  112. URN‏‎ (8 revisions)
  113. Web Authentication Level 2‏‎ (8 revisions)
  114. Web View‏‎ (8 revisions)
  115. Authentication Cookie‏‎ (9 revisions)
  116. Background process‏‎ (9 revisions)
  117. Code of Hammurabi‏‎ (9 revisions)
  118. Consumer‏‎ (9 revisions)
  119. Foreground process‏‎ (9 revisions)
  120. Free Speech‏‎ (9 revisions)
  121. Information Owner‏‎ (9 revisions)
  122. Know Your Customer‏‎ (9 revisions)
  123. Legal Name‏‎ (9 revisions)
  124. Native User Agent‏‎ (9 revisions)
  125. Privacy Enhancing Technology Provider‏‎ (9 revisions)
  126. Smart Card‏‎ (9 revisions)
  127. The Dark Forest‏‎ (9 revisions)
  128. Web App Manifest‏‎ (9 revisions)
  129. Web Site‏‎ (9 revisions)
  130. Zero Trust Architecture‏‎ (9 revisions)
  131. Apophenia‏‎ (10 revisions)
  132. CDN‏‎ (10 revisions)
  133. Deploy MS SQL to AWS‏‎ (10 revisions)
  134. Federated Trust‏‎ (10 revisions)
  135. IIS URL Rewrite‏‎ (10 revisions)
  136. Identity Proofing‏‎ (10 revisions)
  137. Machine Learning‏‎ (10 revisions)
  138. NIST SP 800-63-3C‏‎ (10 revisions)
  139. Personal Information Agent‏‎ (10 revisions)
  140. Security Event Token‏‎ (10 revisions)
  141. The Cloud‏‎ (10 revisions)
  142. To Trust or not to Trust‏‎ (10 revisions)
  143. URI‏‎ (10 revisions)
  144. User Experience‏‎ (10 revisions)
  145. Xamarin Forms‏‎ (10 revisions)
  146. Authentication Protocols‏‎ (11 revisions)
  147. California Consumer Privacy Act of 2018‏‎ (11 revisions)
  148. Change Password‏‎ (11 revisions)
  149. Consent Receipt Construction‏‎ (11 revisions)
  150. Contract of Adhesion‏‎ (11 revisions)
  151. Digital Fingerprint‏‎ (11 revisions)
  152. Federation‏‎ (11 revisions)
  153. HTTPS Connection Issues‏‎ (11 revisions)
  154. Identity Model Overview‏‎ (11 revisions)
  155. National Law Enforcement Telecommunications System (NLETS)‏‎ (11 revisions)
  156. Security Token‏‎ (11 revisions)
  157. Self-issued OpenID Provider‏‎ (11 revisions)
  158. User Intent‏‎ (11 revisions)
  159. Web Payments‏‎ (11 revisions)
  160. Base64‏‎ (12 revisions)
  161. Consciousness‏‎ (12 revisions)
  162. Derived Credential‏‎ (12 revisions)
  163. Federation API‏‎ (12 revisions)
  164. Framework Profile‏‎ (12 revisions)
  165. One-Time Password Authenticator‏‎ (12 revisions)
  166. Privacy Regulation‏‎ (12 revisions)
  167. Redress‏‎ (12 revisions)
  168. Trust Registry Identifier‏‎ (12 revisions)
  169. Trusted Browser‏‎ (12 revisions)
  170. Trusted Identifier in Cyberspace‏‎ (12 revisions)
  171. Validated‏‎ (12 revisions)
  172. Verified Claim‏‎ (12 revisions)
  173. Compliance‏‎ (13 revisions)
  174. Identity Theft‏‎ (13 revisions)
  175. Induction‏‎ (13 revisions)
  176. Internet Bill of Rights‏‎ (13 revisions)
  177. Late Binding Token‏‎ (13 revisions)
  178. Persona‏‎ (13 revisions)
  179. Resource‏‎ (13 revisions)
  180. Revocation‏‎ (13 revisions)
  181. User‏‎ (13 revisions)
  182. Corroborated‏‎ (14 revisions)
  183. Information Sharing‏‎ (14 revisions)
  184. NIST SP 800-63-3‏‎ (14 revisions)
  185. Notification‏‎ (14 revisions)
  186. PHI‏‎ (14 revisions)
  187. PKCS 12‏‎ (14 revisions)
  188. User Information‏‎ (14 revisions)
  189. User Name‏‎ (14 revisions)
  190. Web Site Identity‏‎ (14 revisions)
  191. Biometric Attribute‏‎ (15 revisions)
  192. Fraud Detection‏‎ (15 revisions)
  193. Hundred Points of Light‏‎ (15 revisions)
  194. Innovation‏‎ (15 revisions)
  195. Mind‏‎ (15 revisions)
  196. Native App URI Handlers‏‎ (15 revisions)
  197. Persistent‏‎ (15 revisions)
  198. Proof of Presence‏‎ (15 revisions)
  199. Smartphone Wireless‏‎ (15 revisions)
  200. Subject Identifier‏‎ (15 revisions)
  201. Token Binding‏‎ (15 revisions)
  202. Web App‏‎ (15 revisions)
  203. Civil Society‏‎ (16 revisions)
  204. FirstNet‏‎ (16 revisions)
  205. Laws of Security‏‎ (16 revisions)
  206. Threat Model‏‎ (16 revisions)
  207. Blockchain Privacy‏‎ (17 revisions)
  208. Determinism‏‎ (17 revisions)
  209. FHIR‏‎ (17 revisions)
  210. Privacy as the Enemy‏‎ (17 revisions)
  211. Utopia‏‎ (17 revisions)
  212. Apps on User Devices‏‎ (18 revisions)
  213. Authorization Code‏‎ (18 revisions)
  214. EHR‏‎ (18 revisions)
  215. Hunting‏‎ (18 revisions)
  216. Presence‏‎ (18 revisions)
  217. Trust Service‏‎ (18 revisions)
  218. Authorization‏‎ (19 revisions)
  219. Hardware Protection‏‎ (19 revisions)
  220. OpenID in Smartphones‏‎ (19 revisions)
  221. Security‏‎ (19 revisions)
  222. Social Contract‏‎ (19 revisions)
  223. Truth‏‎ (19 revisions)
  224. User Tracking‏‎ (19 revisions)
  225. Compliant Implementation of RP on ASP.NET‏‎ (20 revisions)
  226. Distributed Consistency‏‎ (20 revisions)
  227. Intelligent Design‏‎ (20 revisions)
  228. Persistent Connection Management‏‎ (20 revisions)
  229. Recovery‏‎ (20 revisions)
  230. Culture‏‎ (21 revisions)
  231. Exceptional Access‏‎ (21 revisions)
  232. Information‏‎ (21 revisions)
  233. Privacy in an Emergency‏‎ (21 revisions)
  234. Public Key Infrastructure‏‎ (21 revisions)
  235. Self-Sovereign Identity‏‎ (21 revisions)
  236. Technology Solution‏‎ (21 revisions)
  237. Trust in Financial Institutions‏‎ (21 revisions)
  238. URL‏‎ (21 revisions)
  239. User Agent‏‎ (21 revisions)
  240. Accreditation Service‏‎ (22 revisions)
  241. Authenticator‏‎ (22 revisions)
  242. Claim‏‎ (22 revisions)
  243. Decentralized Identifier‏‎ (22 revisions)
  244. EV Cert‏‎ (22 revisions)
  245. Ecosystem‏‎ (22 revisions)
  246. Identifier or Attribute Provider‏‎ (22 revisions)
  247. JWT‏‎ (22 revisions)
  248. Proof Key for Code Exchange‏‎ (22 revisions)
  249. Anonymous‏‎ (23 revisions)
  250. Channel Binding‏‎ (23 revisions)
  251. GDPR‏‎ (23 revisions)
  252. Modeling Ecosystems‏‎ (23 revisions)
  253. Simplicity‏‎ (23 revisions)
  254. User Private Information‏‎ (23 revisions)
  255. Bearer Token‏‎ (24 revisions)
  256. Decentralized Resource Identifier‏‎ (24 revisions)
  257. Digital object identifier‏‎ (24 revisions)
  258. Information wants to be Free‏‎ (24 revisions)
  259. Self-signed Certificate‏‎ (24 revisions)
  260. Bitcoin‏‎ (25 revisions)
  261. Native App‏‎ (25 revisions)
  262. OAuth 2.0‏‎ (25 revisions)
  263. Resilience‏‎ (25 revisions)
  264. Trusted Location‏‎ (25 revisions)
  265. Bound Token‏‎ (26 revisions)
  266. Consent Management‏‎ (26 revisions)
  267. Disruption‏‎ (26 revisions)
  268. Main Page‏‎ (26 revisions)
  269. Subject ID‏‎ (26 revisions)
  270. Trusted Computing‏‎ (26 revisions)
  271. Vaccination Credential Initiative‏‎ (26 revisions)
  272. Artificial Intelligence‏‎ (27 revisions)
  273. Multi-factor Authentication‏‎ (27 revisions)
  274. Attribute‏‎ (28 revisions)
  275. Compliant Implementation of Native User Agent‏‎ (28 revisions)
  276. Distributed Identity‏‎ (28 revisions)
  277. Financial User Consent‏‎ (28 revisions)
  278. HTTP/3‏‎ (28 revisions)
  279. Ion ID‏‎ (28 revisions)
  280. Smartphone‏‎ (28 revisions)
  281. Trust Vector‏‎ (28 revisions)
  282. User Trust of a Web Site‏‎ (29 revisions)
  283. Web Authentication‏‎ (29 revisions)
  284. Authentication UX‏‎ (30 revisions)
  285. Building a Wiki‏‎ (30 revisions)
  286. Private Key Component‏‎ (30 revisions)
  287. Service Worker‏‎ (30 revisions)
  288. Trusted Identifier‏‎ (31 revisions)
  289. Best Practice in HealthCare‏‎ (32 revisions)
  290. Attested‏‎ (33 revisions)
  291. Best Practice and Example Identifier Provider‏‎ (33 revisions)
  292. FIDO U2F‏‎ (33 revisions)
  293. Health Care Identity Management‏‎ (33 revisions)
  294. Key Store‏‎ (33 revisions)
  295. Native App Privacy‏‎ (33 revisions)
  296. Publish Project to AWS‏‎ (33 revisions)
  297. Shared Data Protection‏‎ (33 revisions)
  298. Conduct Risk‏‎ (34 revisions)
  299. Credential‏‎ (34 revisions)
  300. Patient Experience‏‎ (34 revisions)
  301. WebID Comparison‏‎ (34 revisions)
  302. IIS as Reverse Proxy‏‎ (35 revisions)
  303. OpenID Connect‏‎ (35 revisions)
  304. Verified Information‏‎ (35 revisions)
  305. Privacy Risk‏‎ (36 revisions)
  306. User Object‏‎ (36 revisions)
  307. Consent Manifesto‏‎ (37 revisions)
  308. Progressive Web App‏‎ (37 revisions)
  309. Identity Management‏‎ (38 revisions)
  310. Self-issued Identifier‏‎ (38 revisions)
  311. API‏‎ (39 revisions)
  312. Bayesian Identity Proofing‏‎ (39 revisions)
  313. Identity Pathology‏‎ (39 revisions)
  314. Web Site Security‏‎ (39 revisions)
  315. Pseudonym‏‎ (40 revisions)
  316. Best Practice and Example Relying Party‏‎ (41 revisions)
  317. Design Pattern‏‎ (41 revisions)
  318. GDPR Avoidance‏‎ (41 revisions)
  319. TEFCA‏‎ (41 revisions)
  320. Bootstrapping Identity and Consent‏‎ (42 revisions)
  321. Deploy .NET to AWS‏‎ (42 revisions)
  322. Scope‏‎ (42 revisions)
  323. Medical Records Identifier‏‎ (43 revisions)
  324. Patient Credential‏‎ (43 revisions)
  325. Consent‏‎ (44 revisions)
  326. Mobile Driver's License‏‎ (44 revisions)
  327. Distributed ID‏‎ (45 revisions)
  328. Federation Assurance Level 3‏‎ (45 revisions)
  329. Health Care Native Application‏‎ (45 revisions)
  330. Personal Privacy‏‎ (47 revisions)
  331. Framework‏‎ (49 revisions)
  332. User Consent‏‎ (49 revisions)
  333. Ethics‏‎ (50 revisions)
  334. InterPlanetary File System‏‎ (51 revisions)
  335. Common Good‏‎ (52 revisions)
  336. Identifier‏‎ (53 revisions)
  337. Identity Model‏‎ (53 revisions)
  338. Verifiable Claim‏‎ (53 revisions)
  339. Decentralized ID‏‎ (54 revisions)
  340. Evolution‏‎ (55 revisions)
  341. Federation Trust Registry‏‎ (55 revisions)
  342. User Stipulation‏‎ (55 revisions)
  343. Web ID‏‎ (55 revisions)
  344. Assurance‏‎ (56 revisions)
  345. Best Practice and Example Trust Registry‏‎ (58 revisions)
  346. Complexity‏‎ (58 revisions)
  347. Universal Serial Bus (USB)‏‎ (59 revisions)
  348. Homeostasis‏‎ (61 revisions)
  349. Native App Security‏‎ (61 revisions)
  350. Entity Statement‏‎ (62 revisions)
  351. Open Banking‏‎ (65 revisions)
  352. X.509 Certificate‏‎ (67 revisions)
  353. Bearer Tokens Considered Harmful‏‎ (70 revisions)
  354. Health Care Native App Example‏‎ (70 revisions)
  355. Mobile Driver's License Presentation‏‎ (70 revisions)
  356. Identity Taxonomy‏‎ (77 revisions)
  357. Progressive Authentication‏‎ (77 revisions)
  358. Software Statement‏‎ (78 revisions)
  359. Health Care Digital Identity‏‎ (84 revisions)
  360. Blockchain‏‎ (85 revisions)
  361. Docker‏‎ (87 revisions)
  362. Federated Ecosystem‏‎ (87 revisions)
  363. Best Practice and Example Self-issued Identifier‏‎ (94 revisions)
  364. Right to be Forgotten‏‎ (96 revisions)
  365. Trusted Execution Environment‏‎ (97 revisions)
  366. GDPR is a scam‏‎ (100 revisions)
  367. Identity‏‎ (106 revisions)
  368. Knowledge‏‎ (110 revisions)
  369. Consent Receipt‏‎ (125 revisions)
  370. Authentication Providers‏‎ (144 revisions)
  371. Cookies‏‎ (146 revisions)
  372. Eventful Universe‏‎ (163 revisions)
  373. General Theory of Living Systems‏‎ (170 revisions)
  374. Privacy‏‎ (193 revisions)
  375. Trust‏‎ (219 revisions)

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)