RudraPrivacy-Preserving Verifiable CredentialsIn this article, I will explain how Verifiable Credentials (VCs) can be used to satisfy certain Cameron’s laws of Identity to provide…Feb 28Feb 28
RudraDecentralised Identifiers (DIDs)In my last article “Self Sovereign Digital Identity: How it works?”, I had shown the use of various concepts like DIDs, DID Documents…Dec 9, 2023Dec 9, 2023
RudraSelf Sovereign Digital Identity: How it works?In my last article, I described the idea of Self Sovereign Digital Identity, and how it will provide both security and privacy that will be…Nov 4, 2023Nov 4, 2023
RudraSelf Sovereign Digital Identity: The IdeaThe promise of self sovereign digital identity is to provide both security and privacy that will be in the control of the subject (user…Oct 7, 2023Oct 7, 2023
RudraPredict CVSS score for new CVEsThis article demonstrates the use of text analysis and linear regression to predict score for a newly identified software vulnerability…Nov 28, 2020Nov 28, 2020
RudraTutorial: neo4j, neomodel, pythonExample code for creating models with relationships, and interacting with data using both object and cypher queries.May 22, 2020May 22, 2020