Skip to main content
Show submenu for Solutions
Solutions
Decentralized Identities
Fraud detection - AML
Cyber Security
Confidential Computing
Key Management
Pharma & Research
Show submenu for Products
Products
Partisia Platform
My Data Activation
Confidential Computing
Show submenu for Tech
Tech
Multi-Party Computation
Blockchain
Deployment
Regulations
Show submenu for Next
Next
Research & Development
Quantum Computing
Artificial Intelligence
Show submenu for About
About
Our story
Our team
Career
Contact
Press section
Newsletter
Show submenu for Blog
Blog
Blog
Use Cases
Download PDF
Webinar
Documentation
日本語
Open main navigation
Close main navigation
Show submenu for Solutions
Solutions
Solutions
Solutions
Decentralized Identities
Fraud detection - AML
Cyber Security
Confidential Computing
Key Management
Pharma & Research
Show submenu for Products
Products
Products
Products
Partisia Platform
My Data Activation
Confidential Computing
Show submenu for Tech
Tech
Tech
Tech
Multi-Party Computation
Blockchain
Deployment
Regulations
Show submenu for Next
Next
Next
Next
Research & Development
Quantum Computing
Artificial Intelligence
Show submenu for About
About
About
About
Our story
Our team
Career
Contact
Press section
Newsletter
Show submenu for Blog
Blog
Blog
Blog
Blog
Use Cases
Download PDF
Webinar
Documentation
日本語
Get started
Get started
All articles from Mette Tulin Antonsen
Use case
•
2025.05.13
Universities: Transitioning from physical verification cards to digital IDs with Decentralized Identity for exam authentication
Read article
Technology
•
2025.04.10
Selective Disclosure: The power to share just enough
Read article
Technology
•
2025.04.10
What is data minimization? Key tools and techniques
Read article
Technology
•
2025.04.10
eIDAS 2.0 explained: The EU’s vision for digital identity
Read article
Technology
•
2025.03.05
Blockchain and Multi-Party Computation: The perfect match for secure data collaboration
Read article
Technology
•
2025.03.04
Multi-Party Computation (MPC): 5 quick insights from a Cryptographer on its growing potential
Read article
Technology
•
2025.03.04
Secret Sharing and Multi-Party Computation: The key to secure data collaboration
Read article
Technology
•
2025.02.19
From theory to reality: The world’s first commercial use of Multi-Party Computation (MPC)
Read article
Business
•
2025.02.12
PII and personal data: Definitions and examples
Read article
Technology
•
2025.01.20
Data Privacy Day 2025: Forward-thinking companies will change how we look at data privacy in the future
Read article
Mette Tulin Antonsen
Topics
Use case
Technology
Business