Massachusetts Institute of Technology
Sign in Create Account

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated over 5 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
13224 times

More from Engaging Data Forum

Session II: Too Public or Too Private?

Session II: Too Public or Too Private?

Added over 5 years ago | 00:17:34 | 15476 views

Session I: Using Reality Mining to Improve Public Health and Medicine

Session I: Using Reality Mining to ...

Added over 5 years ago | 00:08:34 | 4662 views

Keynote II

Keynote II

Added over 5 years ago | 00:33:03 | 7996 views

Session II: An Internet Data Sharing Framework for Balancing Privacy and Utility

Session II: An Internet Data Sharin...

Added over 5 years ago | 00:18:07 | 11815 views

Plenary Session: Modeling Social Behavior with Aggregated Location Requests

Plenary Session: Modeling Social Be...

Added over 5 years ago | 00:24:37 | 29734 views

Panel 1: Ensuring Data Protection: Technical Methods

Panel 1: Ensuring Data Protection: ...

Added over 5 years ago | 01:12:00 | 14596 views