Digital identity

Results: 1391



#Item
131Privacy / Digital rights / Human rights / Identity management / Law / Information privacy / Internet privacy / Medical privacy / Privacy Commissioner / Privacy concerns with social networking services

Melbourne 31 October 2014 Privacy and mobile apps: more needs to be done The second annual Global Privacy Enforcement Network (GPEN) Privacy Sweep has found that as mobile apps increase in popularity, many of them are se

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-04-18 00:53:17
132Identity documents / Cybercrime / Digital divide / Privacy / Human rights / Internet privacy / Password / Cyberbullying / Sexting / Social media / Digital citizen / Phishing

at Harvard University Safety, Privacy, and Digital Citizenship High School Curriculum DIGITAL LITERACY

Add to Reading List

Source URL: blogs.harvard.edu

Language: English - Date: 2016-03-16 12:02:43
133Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
134Identity management / Identity documents / Computer access control / Privacy / Federated identity / Digital identity / Electronic identification / Authentication / Internet privacy / Interoperability / Smart card / Personally identifiable information

GLOBAL IDENTITY NETWORKING OF INDIVIDUALS The Individualised Digital Identity Model

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2014-03-11 17:40:39
135Ubiquitous computing / Computer storage devices / Smart cards / ISO standards / Computer access control / Security token / Radio-frequency identification / Card reader / Secure Digital / USB / Contactless smart card / Common Access Card

the company identity management charismathics user conveniance

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:19:21
136Identity management / Internet privacy / Pseudonym / Privacy / Pseudonymity / Digital credential

(Un)linkable Pseudonyms in Identity Management What is it about? To exchange data between servers, the items have to be linkable. However, to preserve

Add to Reading List

Source URL: www.iaik.tugraz.at

- Date: 2015-12-01 04:00:02
137Economy / Digital media / Human rights / Technology / Identity management / Law / Privacy / Financial privacy / Internet privacy / Medical privacy / Internet

FFN Privacy Notice - v4pdf

Add to Reading List

Source URL: www.freedomfinancialnetwork.com

Language: English - Date: 2016-06-13 06:44:33
138Economy / Human-based computation / Crowdsourcing / Social information processing / Web services / Business / Computing / Digital labor / Amazon Mechanical Turk / Microwork / Outsourcing

Chapter appearing in Flecker, J. (edSpace, place and global digital work. London: Palgrave-Macmillan. Algorithms That Divide and Unite: Delocalization, Identity, and Collective Action in ‘Microwork’ Vili Le

Add to Reading List

Source URL: vili.lehdonvirta.com

Language: English - Date: 2015-10-26 16:34:25
139

Digital Footprints and Changing Networks During Online Identity Transitions Oliver L. Haimson Jed R. Brubaker Lynn Dombrowski Gillian R. Hayes

Add to Reading List

Source URL: oliverhaimson.com

Language: English - Date: 2016-02-15 02:43:07
    140Academic publishing / Academia / Knowledge / Public sphere / Digital media / Research / Identity management / Conferences / Abstract / Password / Form / Electronic submission

    Important information about Abstract submissions Important pieces of information to know before you submit an abstract. - Before clicking the link to submit an abstract, be sure your abstract is written. o It is importan

    Add to Reading List

    Source URL: volunteers.sae.org

    Language: English - Date: 2015-12-18 13:20:31
    UPDATE