Homepage
Open in app
Sign in
Get started
Finema
Enterprise Decentralized Identity
KERI & vLEI
Digital Identity
Identity Terminology
About us
Follow
This Month in Digital Identity — November Edition
This Month in Digital Identity — November Edition
Welcome to the November edition of our monthly digital identity series! This month, we’re diving into essential advancements shaping…
Wint Hmone Thant
Oct 31
This Month in Digital Identity — October Edition
This Month in Digital Identity — October Edition
Welcome to the October edition of our monthly digital identity series! This month, we’re exploring the critical developments and…
Wint Hmone Thant
Oct 1
This Month in Digital Identity — September Edition
This Month in Digital Identity — September Edition
Welcome to the September edition of our monthly digital identity series! This month, we’re exploring the critical developments and…
Wint Hmone Thant
Sep 2
This Month in Digital Identity — August Edition
This Month in Digital Identity — August Edition
Welcome to the August edition of our monthly digital identity segment! This month, we’re diving deep into pivotal advancements and…
Wint Hmone Thant
Aug 12
4 Criteria for Great vLEI Use Cases
4 Criteria for Great vLEI Use Cases
Org-to-Org, Cross-border, highly regulated, and open ecosystems.
Yanisa Sunanchaiyakarn
Jun 22
KERI Tutorial: Sign and Verify with Signify & Keria
KERI Tutorial: Sign and Verify with Signify & Keria
Authors: Kriskanin Hengniran & Nuttawut Kongsuwan, Finema Co., Ltd.
Kriskanin Hengniran
May 5
vLEI Demystified Part 3: QVI Qualification Program
vLEI Demystified Part 3: QVI Qualification Program
Authors: Yanisa Sunanchaiyakarn & Nuttawut Kongsuwan, Finema Co. Ltd.
Yanisa Sunanchaiyakarn
Apr 19
The Hitchhiker’s Guide to KERI. Part 3: How do you use KERI?
The Hitchhiker’s Guide to KERI. Part 3: How do you use KERI?
This blog is the thir part of a three-part series, the Hitchhiker’s Guide to KERI:
Nuttawut Kongsuwan
Apr 13
vLEI Demystified Part 2: Identity Verification
vLEI Demystified Part 2: Identity Verification
Authors: Yanisa Sunanchaiyakarn & Nuttawut Kongsuwan, Finema Co. Ltd.
Yanisa Sunanchaiyakarn
Mar 29
The Hitchhiker’s Guide to KERI. Part 2: What exactly is KERI?
The Hitchhiker’s Guide to KERI. Part 2: What exactly is KERI?
Nuttawut Kongsuwan
Mar 16
The Hitchhiker’s Guide to KERI. Part 1
The Hitchhiker’s Guide to KERI. Part 1
Why should you adopt KERI?
Nuttawut Kongsuwan
Jan 18
vLEI Demystified Part 1: Comprehensive Overview
vLEI Demystified Part 1: Comprehensive Overview
Overview of the stakeholders, key management, and credentials in the vLEI ecosystem.
Yanisa Sunanchaiyakarn
Dec 26, 2023
KERI jargon in a nutshell. Part 3: OOBI and IPEX.
KERI jargon in a nutshell. Part 3: OOBI and IPEX.
OOBI & IPEX
Nuttawut Kongsuwan
Jul 23, 2023
KERI jargon in a nutshell. Part 2: SAID and ACDC.
KERI jargon in a nutshell. Part 2: SAID and ACDC.
SAID & ACDC
Nuttawut Kongsuwan
Jun 4, 2023
KERI jargon in a nutshell. Part 1: KERI and AID.
KERI jargon in a nutshell. Part 1: KERI and AID.
KERI & AID
Nuttawut Kongsuwan
Mar 20, 2023
Face Liveness Detection: The New Normal of Identity Verification
Face Liveness Detection: The New Normal of Identity Verification
With the advancement of computer vision and deep learning, face recognition has become very efficient and is now widely used by financial…
Phitchapha Lertsiravarameth
Oct 20, 2022
Overview, Applications, and Use Cases of Multi-Party Computation (MPC) for Key Management
Overview, Applications, and Use Cases of Multi-Party Computation (MPC) for Key Management
Multi-Party Computation (MPC) has recently emerged as one of the most promising techniques for protecting secrets such as cryptographic…
Rachata Tosirisuk
Oct 15, 2022
Trusted Timestamping Part 3: Family of Standards
Trusted Timestamping Part 3: Family of Standards
Standards you could study in order to establish trusted timestamping services
Nunnaphat Songmanee
Apr 10, 2022
Trusted Timestamping Part 2: Process and Safeguards
Trusted Timestamping Part 2: Process and Safeguards
How PKI-based timestamp tokens are issued, and how TSAs are overseen
Nunnaphat Songmanee
Apr 8, 2022
Trusted Timestamping Part 1: Scenarios
Trusted Timestamping Part 1: Scenarios
How to produce evidentiary value with more and more robustness
Nunnaphat Songmanee
Mar 29, 2022
Anonymous Credential Part 2: Selective Disclosure and CL Signature
This series of three parts was co-written by: — Dr. Nuttawut Kongsuwan, Finema & QTFT — Rachata Tosirisuk, Thailand Internet Exchange…
Rachata Tosirisuk
Feb 3, 2021
Anonymous Credential Part 3: BBS+ Signature
Anonymous Credential Part 3: BBS+ Signature
This series of three parts was co-written by: — Dr Nuttawut Kongsuwan, Finema & QTFT — Rachata Tosirisuk, Thailand Internet Exchange…
Rachata Tosirisuk
Oct 27, 2020
About Finema
Latest Stories
Archive
About Medium
Terms
Privacy
Teams