w3c-ccg / security-vocab
The Linked Data Security Vocabulary
☆21Updated 2 years ago
Alternatives and similar repositories for security-vocab:
Users that are interested in security-vocab are comparing it to the libraries listed below
- Linked Data Signatures for JWS☆13Updated 2 years ago
- COMMUNITY: W3C Credentials Community Group Community Repo☆41Updated last year
- Specification for a query language to request Verifiable Presentations from wallets etc.☆9Updated 6 months ago
- A CBOR-encoding for Linked Data.☆14Updated this week
- DID resolver for HTTPS domains☆88Updated last week
- ☆31Updated 4 years ago
- ☆35Updated last year
- A data model and abstract interfaces for digital wallets☆56Updated last month
- Wallet And Credential Interactions for Presentation Exchange (Work continues at decentralized-identity/waci-didcomm#1 )☆17Updated 3 years ago
- A privacy-preserving mechanism to publish status information for Verifiable Credentials.☆25Updated last week
- A Javascript CBOR-LD processor for web browsers and Node.js apps.☆25Updated last week
- A did-io driver for the DID "key" method☆29Updated 7 months ago
- Format that normalizes the definition of requirements for the issuance of a credential☆30Updated last year
- An Encrypted Data Vault Client☆13Updated 2 months ago
- A spec for the did:peer DID method.☆30Updated 4 years ago
- An IETF specification for cryptographic hyperlinking☆15Updated 4 years ago
- W3C Data Integrity Specification☆42Updated last week
- Python Implementation of the KERI Core Libraries☆28Updated 2 years ago
- WORK ITEM: Authorization Capabilities (ZCAP) specification☆31Updated 2 years ago
- The Credential Profile Matrix and its documentation☆20Updated 2 years ago
- A rich DID method that has no blockchain dependencies. The verifiable data registry is a synchronization protocol between peers.☆29Updated 4 months ago
- JS implementation of pack and unpack☆55Updated 2 years ago
- Key Event Receipt Infrastructure - the spec and implementation of the KERI protocol☆75Updated 2 years ago
- An SDK to help Relying Parties perform crypto operations relating to Verifiable Credentials.☆17Updated 3 years ago
- Verifiable Credential Extensions☆12Updated 2 months ago
- RELEASED DRAFT: Decentralized Identifier Resolution (DID Resolution) 0.2 Specification☆22Updated last week
- ☆35Updated 2 years ago
- Confidential Storage Specification and Implementation☆83Updated 2 years ago
- A variant of a Fuzzy Vault cryptographic scheme designed for encrypting data with better human recovery features.☆49Updated 4 years ago
- A traceability vocabulary for describing relevant Verifiable Credentials and their contents.☆34Updated 5 months ago