We’ve just sent to NIST Pomcor’s response to the NSTIC Notice of Inquiry with answers to questions 2.2 and 2.3.
Follow Us on Twitter
- Feedback on the Paper on Privacy Postures of Authentication Technologies
- Comparing the Privacy Features of Eighteen Authentication Technologies
- Two Methods of Cryptographic Single Sign-On on Mobile Devices
- Using Cryptographic Authentication without a Cryptographic API on iOS and Android Devices
- Strong Authentication with a Low-Entropy Biometric Key
Our Old Noflail Search Blog