Long pages

Jump to navigation Jump to search

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎GGG ‎[865,328 bytes]
  2. (hist) ‎GGG-R-Z ‎[138,285 bytes]
  3. (hist) ‎Identity Model ‎[56,888 bytes]
  4. (hist) ‎Being Digital ‎[31,310 bytes]
  5. (hist) ‎Mobile Driver's License Criteria ‎[30,951 bytes]
  6. (hist) ‎Trustworthy Healthcare Ecosystem ‎[28,538 bytes]
  7. (hist) ‎Definitions ‎[27,253 bytes]
  8. (hist) ‎Trustmark Evolving Design Pattern ‎[24,631 bytes]
  9. (hist) ‎Best Practices and Example for RP System ‎[24,408 bytes]
  10. (hist) ‎IDESG Baseline Process Use Case ‎[24,027 bytes]
  11. (hist) ‎SALS Supplemental Terms of Use ‎[23,953 bytes]
  12. (hist) ‎Design Pattern: Selecting an Identity ‎[23,671 bytes]
  13. (hist) ‎Authenticate Person, With Token and LOA Process Flow Use Case ‎[21,419 bytes]
  14. (hist) ‎Trust Federation Membership Validation ‎[21,198 bytes]
  15. (hist) ‎Trustworthy Healthcare Application ‎[20,475 bytes]
  16. (hist) ‎Trustworthy Healthcare Provider ‎[19,925 bytes]
  17. (hist) ‎Design Pattern: Common to any Internet Identity Ecosystem ‎[19,919 bytes]
  18. (hist) ‎SALS FAQs ‎[19,869 bytes]
  19. (hist) ‎Phone as Health Care Credential ‎[19,765 bytes]
  20. (hist) ‎Health Care Profile ‎[18,169 bytes]
  21. (hist) ‎User Experience Guidelines Metrics ‎[17,254 bytes]
  22. (hist) ‎User Choice Pattern ‎[17,050 bytes]
  23. (hist) ‎Usable Consents ‎[16,991 bytes]
  24. (hist) ‎High Assurance AZ Token ‎[16,771 bytes]
  25. (hist) ‎UXC Use Case Mapping ‎[15,946 bytes]
  26. (hist) ‎UX Usability Requirements and Guidelines Working Document ‎[15,922 bytes]
  27. (hist) ‎Compliant Implementation of RP on ASP.NET ‎[15,030 bytes]
  28. (hist) ‎Patient Choice ‎[15,006 bytes]
  29. (hist) ‎Authentication for Enrollment in a Financial Service ‎[14,765 bytes]
  30. (hist) ‎Delegated Authentication for User Managed Access ‎[14,734 bytes]
  31. (hist) ‎Security ‎[14,680 bytes]
  32. (hist) ‎Common to any Internet Identity Ecosystem ARR ‎[14,605 bytes]
  33. (hist) ‎Remote Attestation Use Case ‎[14,411 bytes]
  34. (hist) ‎Consent to Create Binding ‎[14,397 bytes]
  35. (hist) ‎Cryptographic Authentication for Access to Online Resources ‎[14,195 bytes]
  36. (hist) ‎Privacy Enhancing Technologies ‎[13,910 bytes]
  37. (hist) ‎Un and Underserved People Use Case ‎[13,717 bytes]
  38. (hist) ‎Digital Travel Credentials ‎[13,622 bytes]
  39. (hist) ‎User Consent ‎[13,493 bytes]
  40. (hist) ‎User Experience Trust Metrics ‎[13,405 bytes]
  41. (hist) ‎User Agent in the Cloud ‎[13,383 bytes]
  42. (hist) ‎User Experience Overview ‎[13,258 bytes]
  43. (hist) ‎GGG-Sources ‎[13,024 bytes]
  44. (hist) ‎Information Ethics and Human Capability ‎[12,873 bytes]
  45. (hist) ‎Privacy Enhanced by User Agent ‎[12,560 bytes]
  46. (hist) ‎User recovery and redress ‎[12,503 bytes]
  47. (hist) ‎Identity Design Patterns ‎[12,470 bytes]
  48. (hist) ‎Community and Privacy Pattern Language ‎[12,310 bytes]
  49. (hist) ‎December 14, 2016 VPWG Meeting Page ‎[12,253 bytes]
  50. (hist) ‎Device Integrity supporting User Authentication ‎[12,020 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)