Massachusetts Institute of Technology
Sign in Create Account

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated over 5 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
13241 times

More from Engaging Data Forum

Session II: Too Public or Too Private?

Session II: Too Public or Too Private?

Added over 5 years ago | 00:17:34 | 15486 views

Session III: Reality Mining: The End of Personal Privacy?

Session III: Reality Mining: The En...

Added over 5 years ago | 00:18:19 | 19936 views

Session IV: Panel

Session IV: Panel

Added over 5 years ago | 00:14:21 | 11091 views

Plenary Session: Modeling Social Behavior with Aggregated Location Requests

Plenary Session: Modeling Social Be...

Added over 5 years ago | 00:24:37 | 29752 views

Session I: Using Contextual Information to Improve Awareness of Physical Health

Session I: Using Contextual Informa...

Added over 5 years ago | 00:09:32 | 21801 views

Session III: Navigation of Cascading Data Errors

Session III: Navigation of Cascadin...

Added over 5 years ago | 00:14:16 | 20352 views