Long pages

Jump to: navigation, search

Showing below up to 250 results in range #751 to #1,000.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Key Exchange ‎[1,043 bytes]
  2. (hist) ‎Wavelet ‎[1,040 bytes]
  3. (hist) ‎Apple Wallet ‎[1,038 bytes]
  4. (hist) ‎Persistent ‎[1,038 bytes]
  5. (hist) ‎Crypto API ‎[1,015 bytes]
  6. (hist) ‎Technology Acceptance ‎[1,014 bytes]
  7. (hist) ‎Customs and Border Protection ‎[1,013 bytes]
  8. (hist) ‎FIDO UAF ‎[1,012 bytes]
  9. (hist) ‎Simultaneity ‎[1,009 bytes]
  10. (hist) ‎Microsoft RAMP ‎[1,006 bytes]
  11. (hist) ‎Fake Identifier ‎[1,002 bytes]
  12. (hist) ‎Standardization documents from ISO IEC CEN Cenelec ETSI ‎[1,001 bytes]
  13. (hist) ‎Node.js ‎[989 bytes]
  14. (hist) ‎Mass ‎[988 bytes]
  15. (hist) ‎Role ‎[988 bytes]
  16. (hist) ‎Liability ‎[984 bytes]
  17. (hist) ‎Liveness ‎[981 bytes]
  18. (hist) ‎Legal Name ‎[975 bytes]
  19. (hist) ‎Security Token ‎[967 bytes]
  20. (hist) ‎Behavior ‎[963 bytes]
  21. (hist) ‎Authorization Service ‎[962 bytes]
  22. (hist) ‎We live in a Society ‎[959 bytes]
  23. (hist) ‎IIS Security Practices ‎[957 bytes]
  24. (hist) ‎Artificial Identifier ‎[957 bytes]
  25. (hist) ‎POAM ‎[944 bytes]
  26. (hist) ‎Smart Health Card Example ‎[939 bytes]
  27. (hist) ‎Intent Casting ‎[938 bytes]
  28. (hist) ‎Secure Node ‎[937 bytes]
  29. (hist) ‎Hundred Points of Light ‎[931 bytes]
  30. (hist) ‎Photon is a Particle ‎[929 bytes]
  31. (hist) ‎OpenSSL ‎[929 bytes]
  32. (hist) ‎Linking to Apps ‎[928 bytes]
  33. (hist) ‎Seeker ‎[923 bytes]
  34. (hist) ‎Domain Name ‎[919 bytes]
  35. (hist) ‎Developing with MS SQL ‎[919 bytes]
  36. (hist) ‎Vendor Relationship Manager ‎[914 bytes]
  37. (hist) ‎EBSI ‎[901 bytes]
  38. (hist) ‎Consumer ‎[900 bytes]
  39. (hist) ‎Common Criteria ‎[898 bytes]
  40. (hist) ‎OAuth Client ‎[896 bytes]
  41. (hist) ‎Web3 ‎[890 bytes]
  42. (hist) ‎Privacy Enhancing Technology Provider ‎[890 bytes]
  43. (hist) ‎Critical Infrastructure ‎[885 bytes]
  44. (hist) ‎Catfishing ‎[881 bytes]
  45. (hist) ‎URN ‎[880 bytes]
  46. (hist) ‎Domain Name System ‎[879 bytes]
  47. (hist) ‎Apple iOS User Client Apps ‎[876 bytes]
  48. (hist) ‎Logos ‎[866 bytes]
  49. (hist) ‎Client ‎[866 bytes]
  50. (hist) ‎WebAuthn 3 ‎[862 bytes]
  51. (hist) ‎Vulture Capitalist ‎[861 bytes]
  52. (hist) ‎Minimum Vocabulary ‎[856 bytes]
  53. (hist) ‎Exploit ‎[853 bytes]
  54. (hist) ‎Address as Identity Proof ‎[839 bytes]
  55. (hist) ‎Identity Responsibility ‎[832 bytes]
  56. (hist) ‎Secret Key Cryptography ‎[832 bytes]
  57. (hist) ‎Trust in Computer Systems ‎[829 bytes]
  58. (hist) ‎DFARS ‎[826 bytes]
  59. (hist) ‎Zero Knowledge Proof ‎[824 bytes]
  60. (hist) ‎Rule of Law ‎[821 bytes]
  61. (hist) ‎Particle ‎[817 bytes]
  62. (hist) ‎Native SSO ‎[815 bytes]
  63. (hist) ‎Falsification ‎[809 bytes]
  64. (hist) ‎Real Name ‎[805 bytes]
  65. (hist) ‎Single Sign-On for Mobile Apps ‎[802 bytes]
  66. (hist) ‎Banking as a Service ‎[796 bytes]
  67. (hist) ‎Validated ‎[794 bytes]
  68. (hist) ‎PSD2 ‎[791 bytes]
  69. (hist) ‎Self-sovereign identities ‎[784 bytes]
  70. (hist) ‎Privacy in Mobile Credentials ‎[783 bytes]
  71. (hist) ‎Federated Identifier ‎[779 bytes]
  72. (hist) ‎Mapping Purpose to Data Elements ‎[771 bytes]
  73. (hist) ‎Zero Rated Service ‎[770 bytes]
  74. (hist) ‎ID Token ‎[767 bytes]
  75. (hist) ‎Convergence ‎[766 bytes]
  76. (hist) ‎On Truth and Falsehood ‎[764 bytes]
  77. (hist) ‎Universal Resolver ‎[761 bytes]
  78. (hist) ‎OpenID Connect Future ‎[759 bytes]
  79. (hist) ‎Self-issued Reconnection ‎[753 bytes]
  80. (hist) ‎Payment Method as Identity Proof ‎[752 bytes]
  81. (hist) ‎Brand ‎[751 bytes]
  82. (hist) ‎Deploy .NET to Azure ‎[742 bytes]
  83. (hist) ‎Medical Device ‎[739 bytes]
  84. (hist) ‎Attacks ‎[738 bytes]
  85. (hist) ‎Privacy Policy ‎[735 bytes]
  86. (hist) ‎Interest ‎[728 bytes]
  87. (hist) ‎Object Identifier ‎[712 bytes]
  88. (hist) ‎Selective Disclosure ‎[710 bytes]
  89. (hist) ‎Healthcare Sources ‎[706 bytes]
  90. (hist) ‎Veracity ‎[698 bytes]
  91. (hist) ‎SAML 2.0 ‎[698 bytes]
  92. (hist) ‎Network Protocol ‎[686 bytes]
  93. (hist) ‎Remote. Access ‎[682 bytes]
  94. (hist) ‎Anthropocentrism ‎[681 bytes]
  95. (hist) ‎Attaks on Privacy ‎[679 bytes]
  96. (hist) ‎Evolutionary Epistemology ‎[676 bytes]
  97. (hist) ‎Confidential Computing ‎[674 bytes]
  98. (hist) ‎Human Computer Interaction ‎[670 bytes]
  99. (hist) ‎Trademark ‎[666 bytes]
  100. (hist) ‎Identity and Access Management ‎[660 bytes]
  101. (hist) ‎Freedom ‎[658 bytes]
  102. (hist) ‎Voltage Drop ‎[655 bytes]
  103. (hist) ‎Enterprise Mobile Management ‎[653 bytes]
  104. (hist) ‎Trusted Root ‎[646 bytes]
  105. (hist) ‎Trustmark ‎[644 bytes]
  106. (hist) ‎Identity as a Service ‎[637 bytes]
  107. (hist) ‎Minimum Viable Secure Product ‎[634 bytes]
  108. (hist) ‎Persistent Compute Objects ‎[632 bytes]
  109. (hist) ‎Content Authenticity Initiative ‎[628 bytes]
  110. (hist) ‎Trustworthy Computing ‎[625 bytes]
  111. (hist) ‎Surface Book 3 ‎[624 bytes]
  112. (hist) ‎Simulated Reality ‎[621 bytes]
  113. (hist) ‎App Instance Security ‎[618 bytes]
  114. (hist) ‎EUDI Wallet ‎[616 bytes]
  115. (hist) ‎REST ‎[613 bytes]
  116. (hist) ‎Information Age ‎[609 bytes]
  117. (hist) ‎National Security ‎[605 bytes]
  118. (hist) ‎MFA Bombing ‎[603 bytes]
  119. (hist) ‎Registry Metadata ‎[603 bytes]
  120. (hist) ‎Coaxial Cable ‎[599 bytes]
  121. (hist) ‎Prompt Fatigue ‎[597 bytes]
  122. (hist) ‎Memory Safe ‎[596 bytes]
  123. (hist) ‎Provenance ‎[595 bytes]
  124. (hist) ‎Real Identifier ‎[594 bytes]
  125. (hist) ‎Application Lifecycle ‎[586 bytes]
  126. (hist) ‎Linux UX ‎[582 bytes]
  127. (hist) ‎Distinguished Name ‎[581 bytes]
  128. (hist) ‎Formal Model ‎[579 bytes]
  129. (hist) ‎User Managed Access ‎[575 bytes]
  130. (hist) ‎Architecture Framework ‎[572 bytes]
  131. (hist) ‎SIM Card Number ‎[572 bytes]
  132. (hist) ‎Network Address ‎[571 bytes]
  133. (hist) ‎Secure Browser ‎[569 bytes]
  134. (hist) ‎PEM ‎[564 bytes]
  135. (hist) ‎Enterprise ‎[562 bytes]
  136. (hist) ‎IP address ‎[557 bytes]
  137. (hist) ‎Glossary ‎[555 bytes]
  138. (hist) ‎Best Practice .NET MAUI ‎[548 bytes]
  139. (hist) ‎Information Hiding ‎[540 bytes]
  140. (hist) ‎Best Practice WSL ‎[535 bytes]
  141. (hist) ‎Baseline Functional Requirements ‎[535 bytes]
  142. (hist) ‎SIOP ‎[531 bytes]
  143. (hist) ‎Inference ‎[531 bytes]
  144. (hist) ‎Health Information Network ‎[527 bytes]
  145. (hist) ‎Best Practice in Finance ‎[527 bytes]
  146. (hist) ‎Ponzi Scheme ‎[524 bytes]
  147. (hist) ‎Digital Identifier ‎[517 bytes]
  148. (hist) ‎SSH ‎[513 bytes]
  149. (hist) ‎Access Token ‎[505 bytes]
  150. (hist) ‎Identifier and Access Management ‎[500 bytes]
  151. (hist) ‎Json ‎[497 bytes]
  152. (hist) ‎Peer-to-Peer Network ‎[495 bytes]
  153. (hist) ‎Impersonation ‎[495 bytes]
  154. (hist) ‎Mobile Threat Analysis ‎[490 bytes]
  155. (hist) ‎STRIDE ‎[490 bytes]
  156. (hist) ‎COPPA ‎[487 bytes]
  157. (hist) ‎Common Viewer Air System ‎[485 bytes]
  158. (hist) ‎Remote Identification ‎[482 bytes]
  159. (hist) ‎Cypherpunks ‎[479 bytes]
  160. (hist) ‎Holder ‎[475 bytes]
  161. (hist) ‎Human Colossus Foundation ‎[473 bytes]
  162. (hist) ‎SAML ‎[471 bytes]
  163. (hist) ‎Third Party ‎[468 bytes]
  164. (hist) ‎OpenID Apps ‎[466 bytes]
  165. (hist) ‎SIMPLE ‎[465 bytes]
  166. (hist) ‎Small Business Administration ‎[462 bytes]
  167. (hist) ‎Cybernetics ‎[454 bytes]
  168. (hist) ‎Strong Authentication and Identity Workshop ‎[454 bytes]
  169. (hist) ‎Automaton ‎[450 bytes]
  170. (hist) ‎Free Speech ‎[449 bytes]
  171. (hist) ‎Cyber ‎[444 bytes]
  172. (hist) ‎Indicators of Compromise ‎[441 bytes]
  173. (hist) ‎Did-self ‎[439 bytes]
  174. (hist) ‎Best Practice Apple ‎[437 bytes]
  175. (hist) ‎Mutual Authentication ‎[437 bytes]
  176. (hist) ‎Nginx ‎[434 bytes]
  177. (hist) ‎Wave Packet ‎[432 bytes]
  178. (hist) ‎GUID ‎[430 bytes]
  179. (hist) ‎WebAssembly ‎[427 bytes]
  180. (hist) ‎Property ‎[426 bytes]
  181. (hist) ‎Troubleshoot ASP.NET ‎[426 bytes]
  182. (hist) ‎Eliza ‎[425 bytes]
  183. (hist) ‎Data Dictionary ‎[423 bytes]
  184. (hist) ‎Ontic ‎[421 bytes]
  185. (hist) ‎Identity Ecosystem Framework ‎[419 bytes]
  186. (hist) ‎Threshold Key Agreement ‎[416 bytes]
  187. (hist) ‎Price of Anarchy ‎[414 bytes]
  188. (hist) ‎Identity Continuity ‎[414 bytes]
  189. (hist) ‎Symmetry and Equality ‎[412 bytes]
  190. (hist) ‎Root Access to your Smartphone ‎[407 bytes]
  191. (hist) ‎Business ‎[406 bytes]
  192. (hist) ‎Distributed Ledger Technology ‎[402 bytes]
  193. (hist) ‎Evidence ‎[401 bytes]
  194. (hist) ‎ESG ‎[401 bytes]
  195. (hist) ‎Chromium for Windows ‎[400 bytes]
  196. (hist) ‎Global Business Identifiers ‎[397 bytes]
  197. (hist) ‎Entity ‎[397 bytes]
  198. (hist) ‎Autopoietic ‎[396 bytes]
  199. (hist) ‎Machine Readable Document ‎[394 bytes]
  200. (hist) ‎X.590 Signature ‎[389 bytes]
  201. (hist) ‎End to End Encryption ‎[386 bytes]
  202. (hist) ‎Capability ‎[385 bytes]
  203. (hist) ‎Patient Monitoring ‎[384 bytes]
  204. (hist) ‎Data Category ‎[383 bytes]
  205. (hist) ‎U2F Financial ‎[380 bytes]
  206. (hist) ‎HTTP/2 ‎[379 bytes]
  207. (hist) ‎Verified ‎[374 bytes]
  208. (hist) ‎Syntax ‎[373 bytes]
  209. (hist) ‎FIDO Device Onboarding ‎[372 bytes]
  210. (hist) ‎JSON Web Proof ‎[370 bytes]
  211. (hist) ‎Binding ‎[367 bytes]
  212. (hist) ‎Credential Provider ‎[365 bytes]
  213. (hist) ‎Silicon-based Life Form ‎[364 bytes]
  214. (hist) ‎Medical eConsent ‎[353 bytes]
  215. (hist) ‎ASP.NET Security ‎[353 bytes]
  216. (hist) ‎EU Data Act ‎[348 bytes]
  217. (hist) ‎Site ‎[344 bytes]
  218. (hist) ‎Utility Function ‎[343 bytes]
  219. (hist) ‎Anonymization ‎[342 bytes]
  220. (hist) ‎Brain ‎[342 bytes]
  221. (hist) ‎Persistence ‎[339 bytes]
  222. (hist) ‎Emergency Identifier ‎[339 bytes]
  223. (hist) ‎Public Health ‎[338 bytes]
  224. (hist) ‎Network Address Translation ‎[338 bytes]
  225. (hist) ‎Idetifiable Intelligence ‎[331 bytes]
  226. (hist) ‎Cryptographic Modules ‎[326 bytes]
  227. (hist) ‎Carbon-based Life Form ‎[324 bytes]
  228. (hist) ‎Open Secure Device Protocol ‎[323 bytes]
  229. (hist) ‎Information Accumulation ‎[321 bytes]
  230. (hist) ‎Docker Container with Visual Studio Code ‎[318 bytes]
  231. (hist) ‎Computation ‎[314 bytes]
  232. (hist) ‎Issuer ‎[313 bytes]
  233. (hist) ‎Provider ‎[313 bytes]
  234. (hist) ‎Divergence ‎[311 bytes]
  235. (hist) ‎OCSP ‎[308 bytes]
  236. (hist) ‎Von Neumann Bottleneck ‎[305 bytes]
  237. (hist) ‎FTC Section 5 ‎[299 bytes]
  238. (hist) ‎Asynchronous ‎[299 bytes]
  239. (hist) ‎World ID ‎[297 bytes]
  240. (hist) ‎Equilibrium ‎[295 bytes]
  241. (hist) ‎Selective Retention ‎[293 bytes]
  242. (hist) ‎Computer Architect ‎[289 bytes]
  243. (hist) ‎JavaScript ‎[287 bytes]
  244. (hist) ‎Claimant ‎[286 bytes]
  245. (hist) ‎Guardianship ‎[283 bytes]
  246. (hist) ‎Online Attacks ‎[282 bytes]
  247. (hist) ‎Computational Law ‎[279 bytes]
  248. (hist) ‎Personally Identifiable Information ‎[278 bytes]
  249. (hist) ‎Device Identifier ‎[267 bytes]
  250. (hist) ‎Kantara Initiative ‎[267 bytes]

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)