Star 0

Abstract

This session addresses the critical challenges of secure trustworthy applications with respect to Internet threats. This session introduces two new pro-active paradigms. The first provides for protection of applications from Zero-Day Exploits. The second provides secure/reliable identification and authentication services for interactions between various ID providers and identity documents.