Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

National Strategy for Trusted Identities in Cyberspace

Known as: NSTIC, National Strategy for Trusted Identities in Cyberspace (NSTIC) 
The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a US government initiative announced in April 2011 to improve the privacy… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Large-scale personal data has become the new oil of the Internet. However, personal data tend to be monopolized and siloed by… Expand
  • figure 1
Is this relevant?
2012
2012
Many European states have issued electronic identities (eID) to its citizens since the early 2000s. Several have reached full… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure… Expand
Is this relevant?
2011
2011
The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure… Expand
Is this relevant?
2011
2011
  • J. Grant
  • IEEE Internet Computing
  • 2011
  • Corpus ID: 2874374
Password-centric attacks are increasingly common, and reliance on weak password technology has been a growing attack vector that… Expand
Is this relevant?
2011
2011
  • R. Anderson
  • Security Protocols Workshop
  • 2011
  • Corpus ID: 20557420
There has been much academic discussion of federated authentication, and quite some political manoeuvring about ‘e-ID'. The grand… Expand
Is this relevant?
2011
2011
  • R. Anderson
  • Security Protocols Workshop
  • 2011
  • Corpus ID: 6345895
OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this… Expand
Is this relevant?
2011
2011
The high level vision outlined in the NSTIC has buy-in from a broad group of stakeholders. Making it real will involve government… Expand
Is this relevant?
2011
2011
As a result of potential damage to our national infrastructure due to cyber attacks, a number of cyber-security bills have been… Expand
  • figure 1
  • figure 2
  • figure 2
  • table 1
  • figure 3
Is this relevant?
2011
2011
NSTIC [1] calls for the deployment of privacy-friendly (PF) credentials (based on privacy-enhancing technologies) on the Web… Expand
Is this relevant?