List of redirects

Jump to: navigation, search

Showing below up to 35 results in range #1 to #35.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Access →‎ Access Control
  2. Authorization to Use →‎ Authority to Operate
  3. Biometric Identifier →‎ Biometric Factor
  4. Bitcoin →‎ Digital Asset
  5. Block Chain →‎ Blockchain
  6. CUI →‎ Controlled Unclassified Information
  7. Complexity Theory →‎ Computational Complexity Theory
  8. Decentralize Resource Identifier →‎ Decentralized Resource Identifier
  9. Decentralized Identifiers →‎ Decentralized Identifier
  10. Derived Motile Credential →‎ Derived Mobile Credential
  11. Digital Right Management →‎ Digital Rights Management
  12. EHI →‎ PHI
  13. FedRamp →‎ FedRAMP
  14. Federation Service →‎ Federation Trust Registry
  15. Federation Trust Repository →‎ Federation Trust Registry
  16. First-Party Set →‎ Related Website Sets
  17. IAP →‎ Identifier or Attribute Provider
  18. Identity Pathologies →‎ Identity Pathology
  19. MDL Considered Evil →‎ MDL Considered Harmfull
  20. MDL Considered Harmfull →‎ MDL Considered Harmful
  21. OP →‎ OpenID Provider
  22. Peer-to-peer Network →‎ Peer-to-Peer Network
  23. Phishing. →‎ Phishing
  24. RP →‎ Relying Party
  25. Risk Assessment →‎ Risk Analysis
  26. Single Sign On →‎ Single Sign-On
  27. Smart Phone →‎ Smartphone
  28. The Web →‎ World Wide Web
  29. Thousand Points of Light →‎ Hundred Points of Light
  30. Trust Registry →‎ Federation Trust Registry
  31. Trusted Identifier in Cyberspace →‎ Trusted Identifiers in Cyberspace
  32. Trusted Identity in Cyberspace →‎ Trusted Identifier in Cyberspace
  33. UMA →‎ User Managed Access
  34. Unclonable Identity →‎ Unclonable Identifier
  35. Web Authentication Level 2 →‎ Web Authentication Levels

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)