Dead-end pages

From IIW
Jump to: navigation, search

The following pages do not link to other pages in IIW.

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. "NSTIC Day" Proposed Agenda
  2. "Today Geekdom, Tomorrow the World"
  3. $1M Does Your Project Stack Up? Come find out
  4. (In)Coherent Web (in)security Policy Framework
  5. (in)Security Questions
  6. (new?) Business Models Based on Reputation
  7. 0G/ Women's Breakfast
  8. 101 Introduction to DID’s, Verifiable Claims and Blockchains
  9. 101 Introduction to OAuth2
  10. 101 Introduction to OpenID Connect
  11. 101 NIST – Digital Identity Guidelines ‘101’
  12. 12 Competencies for Network Leadership
  13. 1A/ DID 101 – Decentralized Identifiers & how they are the key to interoperable self-sovereign ID
  14. 1A/ DID Service Discovery
  15. 1C/ IEEEE/SA, Evernym, iRespond, SWIRLS – ADV The Human STD Hackathon (100K Refugee Framework)
  16. 1C/ “Verifier Impersonation Resistance”
  17. 1F/ Functional Identity
  18. 1G/ Fair Dice Roll’s in On-Line Game’s using Blockchains
  19. 1G/ “It’s a Pain In The Ass, But it’s Well Supported” (FIdM)
  20. 1I/ Application Identity and Trust in Healthcare and beyond
  21. 2A/ How to Live with Shadow IT
  22. 2C/ Neural Science of Persuasion
  23. 2C/ Privacy – Preserving Geo Location & Other “mystuff” Services
  24. 2F/ SovrinID Card – What should it do?
  25. 2G/ Pop-Up Enterprise
  26. 2H/ ID PRO Body of Knowledge & Taxonomy
  27. 2H/ OTTO –Ifying – FAST-FED?
  28. 2J/ Intro to Verifiable Cliams by W3C VCWG Members
  29. 2K/ Publice vs Private Data – What can we share?
  30. 3A/ DKMS = Decentralized Key Management System
  31. 3A/ Digital Life Collective Cooperative “The Web we want” – Getting to Actual Effects with Identity
  32. 3A/ Privacy Preservation and Controlling Correlation
  33. 3C/ IEEE 2410 Biometric Open Protocol Standard (“BOPS”) EXPLAINED!
  34. 3C/ What is it like to be part of a working group?
  35. 3D/ If You’re Hiring a Student w/a Masters in IDM – What do you think they should know?
  36. 3F/ Usability for Identity Management
  37. 3G/ OpenID Connect Account Parking Overview
  38. 3G/ OpenID Connect Account Porting Overview
  39. 3G/ PICO’s in Practive
  40. 3G/ Storing Crypto Credentials
  41. 3H/ Hybrid Personal Cloud – Applying devops open source tech to personal IoT
  42. 3H/ The UX of Secure Key Management Trust Frameworks
  43. 3I/ DID TLS
  44. 3J/ OTTO Schema
  45. 3K/Distributed Identity
  46. 4A/Reputation vs Identity – Definition Perspectives
  47. 4A/ Digital India II (part 2)
  48. 4A/ Intro to Fast Fed (new passport standard)
  49. 4B/ 101 MFA, 2FA, FIDO
  50. 4B/ libsovrin Hacking – Zero Knowledge Proofs Selective Disclosure and Predicate Proofs

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)