Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,708,419 papers from all fields of science
Search
Sign In
Create Free Account
National Strategy for Trusted Identities in Cyberspace
Known as:
NSTIC
, National Strategy for Trusted Identities in Cyberspace (NSTIC)
The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a US government initiative announced in April 2011 to improve the privacy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Ecosystem
FIDO Alliance
Open Identity Exchange
X.500
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
An Event-Based Method of Construction of Cyberspace Models
Youjun Wang
,
Hongqi Zhang
,
Tianwei Che
,
Chuanfu Zhang
,
Yuntian Zhao
,
C. Yang
International Congress of Mathematicans
2015
Corpus ID: 112339501
Cyberspace has become an important domain the same as the land, sea, air and space. Many cyberspace models were proposed to…
Expand
2015
2015
NSTIC Pilots: Catalyzing the Identity Ecosystem
Katerina Megas
,
P. Lam
,
E. Nadeau
,
C. Soutar
2015
Corpus ID: 223781222
Pilots are an integral part of the National Strategy for Trusted Identities in Cyberspace (NSTIC), issued by the White House in…
Expand
2013
2013
Economic Case Study: The Impact of NSTIC on the Internal Revenue Service | NIST
G. Tassey
2013
Corpus ID: 168903126
2013
2013
Privacy and accountability in identity systems: the best of both worlds
Christian Paquin
2013
Corpus ID: 6585255
Privacy and accountability are widely believed to be opposing goals in identity systems. On one hand, service providers require…
Expand
2012
2012
Middleware architecture for cross-border eID
Bernd Zwattendorfer
,
Ivo Sumelong
,
H. Leitold
Computational Aspects of Social Networks
2012
Corpus ID: 18758958
Many European states have issued electronic identities (eID) to its citizens since the early 2000s. Several have reached full…
Expand
2012
2012
The Case for Personal Identity Verification (PIV) and Personal Identity Verification-Interoperable (PIV-I) identity
2012
Corpus ID: 16574468
The federal government is making strides to implement identity management activities that will streamline the citizen user…
Expand
2011
2011
Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion)
Ross J. Anderson
Security Protocols Workshop
2011
Corpus ID: 6345895
OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this…
Expand
2011
2011
An Overlooked Cryptographic Requirement for NSTIC Francisco Corella , PhD
K. Lewison
2011
Corpus ID: 16220063
NSTIC [1] calls for the deployment of privacy-friendly (PF) credentials (based on privacy-enhancing technologies) on the Web…
Expand
2006
2006
AN INTEGRATED 3D GIS DATA EXTRACTION AND APPLICATIONS BASED ON HIGH RESOLUTION IMAGERY TECHNOLOGY
Yongping Zhao
,
Amani Aiothman
,
H. Al-Hashash
,
Mostafa Kawiani
2006
Corpus ID: 10703009
GIS has been widely used for environment and geospatial related applications. Due to high resolution remote sensing images and…
Expand
1989
1989
The defense research information centre: services and new developments
G. Farguhar
1989
Corpus ID: 62230003
The Defence Research Information Centre, or DRIC as it is commonly known, is the MOD's central deposit and dissemination point…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE