Dead-end pages

From IIW

The following pages do not link to other pages in IIW.

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. "DIF Universal Resolver and Universal Registrarhttps://uniresolver.io/, https://uniregistrar.io/"
  2. "Entity and Object Identifiers: Bringing assurance and immutability to a decentralized network"
  3. "IIW SSI Spotlight: 5 Priority Topics of the SSI-Community 1 wallet backup, 2 on-device credential sync, 3 public DID verification, 4 control over public DIDs, 5 third-party identities"
  4. "KERI (A) Key Event Receipt Infrastructure. A ledger agnostic framework for decentralized identity. KERI unifies many DID methods types.
  5. "Mouse Head Model (MHM): A global solution for safe and secure data sharing"
  6. "NSTIC Day" Proposed Agenda
  7. "Today Geekdom, Tomorrow the World"
  8. $1M Does Your Project Stack Up? Come find out
  9. (In)Coherent Web (in)security Policy Framework
  10. (in)Security Questions
  11. (new?) Business Models Based on Reputation
  12. 0G/ Women's Breakfast
  13. 101 Introduction to DID’s, Verifiable Claims and Blockchains
  14. 101 Introduction to OAuth2
  15. 101 Introduction to OpenID Connect
  16. 101 NIST – Digital Identity Guidelines ‘101’
  17. 101 Session: Verifiable Credential Handler (CHAPI) and DIDComm
  18. 101 Session - Open ID Connect
  19. 101 Session - SSI and Decentralized Identity
  20. 101 Session - UMA User Managed Access
  21. 101 Session / Introduction to UMA = User Managed Access
  22. 101 Session / NIST Digital Identity Guidelines
  23. 101 Session / Open ID Connect
  24. 101 Session / Self-Sovereign Identity (SSI) DID’s, Verifiable Claims etc…
  25. 101 Session OAuth2
  26. 12 Competencies for Network Leadership
  27. 1A/ DID 101 – Decentralized Identifiers & how they are the key to interoperable self-sovereign ID
  28. 1A/ DID Service Discovery
  29. 1C/ IEEEE/SA, Evernym, iRespond, SWIRLS – ADV The Human STD Hackathon (100K Refugee Framework)
  30. 1C/ “Verifier Impersonation Resistance”
  31. 1F/ Functional Identity
  32. 1G/ Fair Dice Roll’s in On-Line Game’s using Blockchains
  33. 1G/ “It’s a Pain In The Ass, But it’s Well Supported” (FIdM)
  34. 1I/ Application Identity and Trust in Healthcare and beyond
  35. 2A/ How to Live with Shadow IT
  36. 2C/ Neural Science of Persuasion
  37. 2C/ Privacy – Preserving Geo Location & Other “mystuff” Services
  38. 2F/ SovrinID Card – What should it do?
  39. 2G/ Pop-Up Enterprise
  40. 2H/ ID PRO Body of Knowledge & Taxonomy
  41. 2H/ OTTO –Ifying – FAST-FED?
  42. 2J/ Intro to Verifiable Cliams by W3C VCWG Members
  43. 2K/ Publice vs Private Data – What can we share?
  44. 3A/ DKMS = Decentralized Key Management System
  45. 3A/ Digital Life Collective Cooperative “The Web we want” – Getting to Actual Effects with Identity
  46. 3A/ Privacy Preservation and Controlling Correlation
  47. 3C/ IEEE 2410 Biometric Open Protocol Standard (“BOPS”) EXPLAINED!
  48. 3C/ What is it like to be part of a working group?
  49. 3D/ If You’re Hiring a Student w/a Masters in IDM – What do you think they should know?
  50. 3D’s of Identity (agents, relationships, ATTR’s)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)