OpenID

Results: 358



#Item
81Mission:

Mission: "this group was formed to create "a cohesive [authentication] strategy and facilitate the use of recognized protocols. This group is "tasked with researching existing industry methods and recommending the adopt

Add to Reading List

Source URL: reso.memberclicks.net

Language: English - Date: 2013-10-14 18:00:13
82TSCP_logo_cmyk_Participation_whitetext.eps

TSCP_logo_cmyk_Participation_whitetext.eps

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-26 17:06:02
83First Line of Defense against Hackers: Secure, Trusted Identity Credentials under a Federation Trust Framework In the wake of seemingly daily news articles about the theft of personal identity, financial, and proprietary

First Line of Defense against Hackers: Secure, Trusted Identity Credentials under a Federation Trust Framework In the wake of seemingly daily news articles about the theft of personal identity, financial, and proprietary

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-27 06:50:02
84Device Token Protocol for Persistent Authentication Shared Across Applications John Trammel, Ümit Yalçınalp, Andrei Kalfas, James Boag, Dan Brotsky Adobe Systems Incorporated, 345 Park Avenue, San Jose, USA {jtrammel,

Device Token Protocol for Persistent Authentication Shared Across Applications John Trammel, Ümit Yalçınalp, Andrei Kalfas, James Boag, Dan Brotsky Adobe Systems Incorporated, 345 Park Avenue, San Jose, USA {jtrammel,

Add to Reading List

Source URL: www.umityalcinalp.com

Language: English - Date: 2013-01-24 18:05:14
85OpenID 登入 UI 與流程設計 簡冠庭 timdream myID.tw / Daodin.tw ICOS 2010  myID.tw / Daodin.tw

OpenID 登入 UI 與流程設計 簡冠庭 timdream myID.tw / Daodin.tw ICOS 2010 myID.tw / Daodin.tw

Add to Reading List

Source URL: blog.timc.idv.tw

Language: English - Date: 2010-09-18 10:16:52
86Features and concepts of Privacy-ABCs Gregory Neven, IBM Research – Zurich  © 2014 IBM Corporation

Features and concepts of Privacy-ABCs Gregory Neven, IBM Research – Zurich © 2014 IBM Corporation

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:40:38
87Federating e-identities across Europe, or how to build cross-border e-services 1 1

Federating e-identities across Europe, or how to build cross-border e-services 1 1

Add to Reading List

Source URL: security.polito.it

Language: English - Date: 2011-12-19 13:03:35
88   	
      An	
  Open	
  Market	
  Solution	
  for	
  

      An  Open  Market  Solution  for  

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
89Automatic and Precise Client-Side Protection against CSRF Attacks Philippe De Ryck, Lieven Desmet, Wouter Joosen, and Frank Piessens IBBT-DistriNet Katholieke Universiteit Leuven 3001 Leuven, Belgium

Automatic and Precise Client-Side Protection against CSRF Attacks Philippe De Ryck, Lieven Desmet, Wouter Joosen, and Frank Piessens IBBT-DistriNet Katholieke Universiteit Leuven 3001 Leuven, Belgium

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
90Cybersecurity through an Identity Management System Elli Androulaki, Maritza Johnson, Binh Vo, and Steven Bellovin Engaging Data Forum October 2009

Cybersecurity through an Identity Management System Elli Androulaki, Maritza Johnson, Binh Vo, and Steven Bellovin Engaging Data Forum October 2009

Add to Reading List

Source URL: senseable.mit.edu

Language: English - Date: 2009-10-27 15:39:07