-
Notifications
You must be signed in to change notification settings - Fork 14
/
Copy pathpresentations.html
26 lines (24 loc) · 2.55 KB
/
presentations.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
<html<head><title>Presentations</title></head>
<body>
<ul>Day 1
<li><a href="https://www.w3.org/Security/201812-Auth-ID/01_-_Day_1_-_Welcome_and_Procedural.pdf">Welcome and Procedural</a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/02_-_Day_1_-_Understanding_Verifiable_Credentials.pdf">Understanding Verifiable Credentials</a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/03_-_Day_1_-_Understanding_DIDs.pdf">Understanding DIDs</a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/04_-_Day_1_-_Understanding_DID_Auth.pdf">Understanding DID Auth</a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/05_-_Day_1_-_Understanding_WebAuthn,_CTAP,_EAT,_FIDO_and_Authenticators.pdf">Understanding WebAuthn, CTAP, EAT, FIDO and Authenticators </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/06_-_Day_1_-_Understanding_JWT_CWT,_OpenID,_and_Related_Ecosystem.pdf">Understanding JWT CWT, OpenID, and Related Ecosystem </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/07_-_Day_1_-_Breakout_Sessions.pdf"> Breakouts </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/08_-_Day_1_-_Market_Verticals_-_Understanding_Current_and_Future_Problems.pdf">Market Verticals - Understanding Current and Future Problems </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/08.5_-_Day_1_-_Market_Verticals_-_Health_Care.pdf"> Market Verticals - Health Care</a>
</ul>
<ul> Day 2
<li><a href="https://www.w3.org/Security/201812-Auth-ID/10_-_Day_2_-_Exploring_Cultural_and_Economic_Perspectives.pdf">Exploring Cultural and Economic Perspectives </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/10.3_Day_2_-_PindarWong.pdf">Law and Borders: Self-Administered IDentifiers and NExTPats: NETizen eXpatriates </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/12_-_Day_2_-_Trusted_Identity.pdf">Trusted Identity</a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/11_-_Day_2_-_Avoiding_Mistakes_and_Minefields.pdf">Avoiding Mistakes and Minefields </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/13_-_Day_2_-_5_Year_Roadmap__DIDs,_VCs,_and_Attestations.pdf">Roadmaps: DIDs, VCs </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/13.5_-_Day_2_-_Attestation-Arm.pdf">Roadmap: Attestation </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/14_-_Day_2_-_5_Year_Roadmap__Authenticators.pdf">Roadmap: Authenticators </a>
<li><a href="https://www.w3.org/Security/201812-Auth-ID/14.5_Day_2_-_5_Year_Roadmap__Authenticators,_Gemalto.pdf">Roadmap: Authenticators (Gemalto) </a>
</ul>
</body>