List of redirects

Jump to: navigation, search

Showing below up to 36 results in range #1 to #36.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Access →‎ Access Control
  2. Authorization to Use →‎ Authority to Operate
  3. Biometric Identifier →‎ Biometric Factor
  4. Bitcoin →‎ Digital Asset
  5. Block Chain →‎ Blockchain
  6. CUI →‎ Controlled Unclassified Information
  7. Complexity Theory →‎ Computational Complexity Theory
  8. Decentralize Resource Identifier →‎ Decentralized Resource Identifier
  9. Decentralized Identifiers →‎ Decentralized Identifier
  10. Derived Motile Credential →‎ Derived Mobile Credential
  11. Digital Right Management →‎ Digital Rights Management
  12. EHI →‎ PHI
  13. FedRamp →‎ FedRAMP
  14. Federation Service →‎ Federation Trust Registry
  15. Federation Trust Repository →‎ Federation Trust Registry
  16. First-Party Set →‎ Related Website Sets
  17. IAP →‎ Identifier or Attribute Provider
  18. Identity Pathologies →‎ Identity Pathology
  19. MDL Considered Evil →‎ MDL Considered Harmfull
  20. MDL Considered Harmfull →‎ MDL Considered Harmful
  21. Mobil Threat Analysis →‎ Mobile Threat Analysis
  22. OP →‎ OpenID Provider
  23. Peer-to-peer Network →‎ Peer-to-Peer Network
  24. Phishing. →‎ Phishing
  25. RP →‎ Relying Party
  26. Risk Assessment →‎ Risk Analysis
  27. Single Sign On →‎ Single Sign-On
  28. Smart Phone →‎ Smartphone
  29. The Web →‎ World Wide Web
  30. Thousand Points of Light →‎ Hundred Points of Light
  31. Trust Registry →‎ Federation Trust Registry
  32. Trusted Identifier in Cyberspace →‎ Trusted Identifiers in Cyberspace
  33. Trusted Identity in Cyberspace →‎ Trusted Identifier in Cyberspace
  34. UMA →‎ User Managed Access
  35. Unclonable Identity →‎ Unclonable Identifier
  36. Web Authentication Level 2 →‎ Web Authentication Levels

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)