Massachusetts Institute of Technology
Sign in | Create Account

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated over 4 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
12450 times

More from Engaging Data Forum

Keynote II

Keynote II

Added over 4 years ago | 00:33:03 | 7410 views

Plenary Session: Ad Morphing: matching online ads to individual cognitive style

Plenary Session: Ad Morphing: match...

Added over 4 years ago | 00:23:24 | 18122 views

Session III: Navigation of Cascading Data Errors

Session III: Navigation of Cascadin...

Added over 4 years ago | 00:14:16 | 19387 views

Session II: Too Public or Too Private?

Session II: Too Public or Too Private?

Added over 4 years ago | 00:17:34 | 14824 views

Session III: Panel

Session III: Panel

Added over 4 years ago | 00:32:37 | 21746 views

Session I: Living Maps: New Data, New Uses, New Problems

Session I: Living Maps: New Data, N...

Added over 4 years ago | 00:15:04 | 14365 views