Massachusetts Institute of Technology
Sign in

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments.

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated over 7 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
15259 times

More from Engaging Data Forum

Panel 1: Ensuring Data Protection: Technical Methods

Panel 1: Ensuring Data Protection: ...

Added over 7 years ago | 01:12:00 | 17124 views

Keynote 1

Keynote 1

Added almost 8 years ago | 00:41:31 | 27641 views

Session IV: Panel

Session IV: Panel

Added almost 8 years ago | 00:14:21 | 12935 views

Keynote II

Keynote II

Added over 7 years ago | 00:33:03 | 9325 views

Session III: Reality Mining: The End of Personal Privacy?

Session III: Reality Mining: The En...

Added almost 8 years ago | 00:18:19 | 22293 views

Plenary Session: Participatory Sensing: from ecosystems to human systems

Plenary Session: Participatory Sens...

Added almost 8 years ago | 00:28:50 | 31332 views