Massachusetts Institute of Technology
Sign in Create Account

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated over 5 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
13464 times

More from Engaging Data Forum

Session III: Navigation of Cascading Data Errors

Session III: Navigation of Cascadin...

Added almost 6 years ago | 00:14:16 | 20646 views

Session I: Using Reality Mining to Improve Public Health and Medicine

Session I: Using Reality Mining to ...

Added almost 6 years ago | 00:08:34 | 4798 views

Plenary Session: Modeling Social Behavior with Aggregated Location Requests

Plenary Session: Modeling Social Be...

Added almost 6 years ago | 00:24:37 | 30188 views

Session III: Panel

Session III: Panel

Added almost 6 years ago | 00:32:37 | 23005 views

Keynote 1

Keynote 1

Added over 5 years ago | 00:41:31 | 25331 views

Panel 1: Ensuring Data Protection: Technical Methods

Panel 1: Ensuring Data Protection: ...

Added over 5 years ago | 01:12:00 | 14973 views