Massachusetts Institute of Technology
Sign in

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments.

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated over 6 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
14481 times

More from Engaging Data Forum

Keynote III

Keynote III

Added over 6 years ago | 00:39:27 | 8588 views

Keynote II

Keynote II

Added over 6 years ago | 00:33:03 | 8838 views

Session III: Navigation of Cascading Data Errors

Session III: Navigation of Cascadin...

Added almost 7 years ago | 00:14:16 | 21974 views

Session I: Using Reality Mining to Improve Public Health and Medicine

Session I: Using Reality Mining to ...

Added almost 7 years ago | 00:08:34 | 5366 views

Plenary Session: Ad Morphing: matching online ads to individual cognitive style

Plenary Session: Ad Morphing: match...

Added almost 7 years ago | 00:23:24 | 20391 views

Plenary Session: Participatory Sensing: from ecosystems to human systems

Plenary Session: Participatory Sens...

Added almost 7 years ago | 00:28:50 | 30023 views