Massachusetts Institute of Technology
Sign in | Create Account

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated 5 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
12964 times

More from Engaging Data Forum

Session III: Reality Mining: The End of Personal Privacy?

Session III: Reality Mining: The En...

Added over 5 years ago | 00:18:19 | 19610 views

Session IV: Mobile-enabled Labor Markets

Session IV: Mobile-enabled Labor Ma...

Added 5 years ago | 00:11:05 | 13298 views

Session III: Panel

Session III: Panel

Added over 5 years ago | 00:32:37 | 22377 views

Session I: Panel

Session I: Panel

Added over 5 years ago | 00:34:44 | 13528 views

Keynote III

Keynote III

Added 5 years ago | 00:39:27 | 7584 views

Session II: An Internet Data Sharing Framework for Balancing Privacy and Utility

Session II: An Internet Data Sharin...

Added over 5 years ago | 00:18:07 | 11596 views