RudraPrivacy-Preserving Verifiable CredentialsIn this article, I will explain how Verifiable Credentials (VCs) can be used to satisfy certain Cameron’s laws of Identity to provide…13 min read·Feb 28, 2024----
RudraDecentralised Identifiers (DIDs)In my last article “Self Sovereign Digital Identity: How it works?”, I had shown the use of various concepts like DIDs, DID Documents…6 min read·Dec 9, 2023----
RudraSelf Sovereign Digital Identity: How it works?In my last article, I described the idea of Self Sovereign Digital Identity, and how it will provide both security and privacy that will be…7 min read·Nov 4, 2023----
RudraSelf Sovereign Digital Identity: The IdeaThe promise of self sovereign digital identity is to provide both security and privacy that will be in the control of the subject (user…5 min read·Oct 7, 2023----
RudraPredict CVSS score for new CVEsThis article demonstrates the use of text analysis and linear regression to predict score for a newly identified software vulnerability…5 min read·Nov 28, 2020----
RudraTutorial: neo4j, neomodel, pythonExample code for creating models with relationships, and interacting with data using both object and cypher queries.2 min read·May 22, 2020----