Massachusetts Institute of Technology
Sign in | Create Account

Session II: Cybersecurity Through an Identity Management System

Elli Androulaki, Maritza Johnson, Binh Vo, Steven Bellovin (Columbia). 10/12/2009

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Engaging Data Forum

Engaging Data Forum

Category: Events | Updated over 4 years ago

Created
November 23, 2009 12:25
Category
Tags
License
All Rights Reserved (What is this?)
Additional Files


Viewed
12673 times

More from Engaging Data Forum

Session II: Too Public or Too Private?

Session II: Too Public or Too Private?

Added almost 5 years ago | 00:17:34 | 14977 views

Session IV: Mobile-enabled Labor Markets

Session IV: Mobile-enabled Labor Ma...

Added almost 5 years ago | 00:11:05 | 13065 views

Session IV: Panel

Session IV: Panel

Added almost 5 years ago | 00:14:21 | 10741 views

Session III: Engineering a Common Good: Fair Use of Aggregated Anonymized Behavioral Data

Session III: Engineering a Common G...

Added almost 5 years ago | 00:13:27 | 13583 views

Session II: On Notice: The Trouble with Notice and Consent

Session II: On Notice: The Trouble ...

Added almost 5 years ago | 00:16:05 | 11250 views

Session III: Mapping Communities in Large Virtual Social Networks

Session III: Mapping Communities in...

Added almost 5 years ago | 00:13:14 | 15963 views