Massachusetts Institute of Technology
Sign in

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments.

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated over 6 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
14276 times

More from Engaging Data Forum

Plenary Session: Modeling Social Behavior with Aggregated Location Requests

Plenary Session: Modeling Social Be...

Added over 6 years ago | 00:24:37 | 31410 views

Plenary Session: Participatory Sensing: from ecosystems to human systems

Plenary Session: Participatory Sens...

Added over 6 years ago | 00:28:50 | 29613 views

Keynote II

Keynote II

Added over 6 years ago | 00:33:03 | 8700 views

Session II: An Internet Data Sharing Framework for Balancing Privacy and Utility

Session II: An Internet Data Sharin...

Added over 6 years ago | 00:18:07 | 12752 views

Session II: On Notice: The Trouble with Notice and Consent

Session II: On Notice: The Trouble ...

Added over 6 years ago | 00:16:05 | 12584 views

Session IV: Mobile-enabled Labor Markets

Session IV: Mobile-enabled Labor Ma...

Added over 6 years ago | 00:11:05 | 14364 views