Digital identity

Results: 1391



#Item
331Dual SIM / Computer hardware / Technology / Secure Digital / Memory card / Electronics / Digital audio players / Mobile phone features / Smartphones / Mobile phones / Subscriber identity module

JT_Logo_MasterVersion_Strapline

Add to Reading List

Source URL: ekit.com

Language: English - Date: 2014-03-20 00:59:26
332Identity management / Computing / OpenID / Web services / Phorm / Identity assurance / Digital identity / Information Card / ICAM / Federated identity / Identity / Computer security

PDF Document

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
333Computer law / Computing / Internet culture / Internet ethics / Digital identity / Criminal law / Legal aspects of computing / Anonymity / Identity theft / Identity / Internet / Cyberspace

Digital Identity in Cyberspace Table of Contents 53 ii Table of contents Table of Contents iii Digital Identity in Cyberspace 8

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 1998-12-18 20:00:16
334Public safety / Digital technology / Surveillance / Identity / Internet privacy / Internet / Digital identity / Computer security / Computer surveillance / Security / Crime prevention / National security

Internet Surveillance with Digital Identity Detection is the New

Add to Reading List

Source URL: infoarmor.com

Language: English - Date: 2014-10-10 15:14:28
335Identity management / Kantara Initiative / Liberty Alliance / XDI / OpenID / Information Card / Digital identity / Identity / Federated identity / Computer security

Kantara Initiative 2011 IDDY Awards Judging Criteria - Emerging Applications Category The IDDY (IDentity Deployment of the Year), formerly awarded by the Liberty Alliance, is the industry’s first event to recognize the

Add to Reading List

Source URL: kantarainitiative.org

Language: English - Date: 2010-08-30 13:36:05
336Information systems / User profile / German National Library of Economics / Internet privacy / Mendeley / Content management system / Computing / Information science / Software / Identity management / Recommender system

Timo Borst – Tamara Pianos - Christin Seifert EEXCESS - Toolbox for managing and disseminating digital library content EEXCESS (eexcess.eu) is an EU-funded project with many international partners like Mendeley, Collec

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
337Identity management / Kantara Initiative / Liberty Alliance / XDI / OpenID / Digital identity / Information Card / Identity Governance Framework / Identity assurance / Identity / Federated identity / Computer security

Kantara Initiative 2011 IDDY Awards Judging Criteria - Identity Deployments The IDDY (IDentity Deployment of the Year), formerly awarded by the Liberty Alliance, is the industry’s first event to recognize the individua

Add to Reading List

Source URL: kantarainitiative.org

Language: English - Date: 2010-09-21 18:45:01
338Identity management / Social issues / Email / Spamming / Internet privacy / Privacy policy / Online shopping / Email spam / Malware / Ethics / Privacy / Computing

Module 11 Staying safe online Digital technology offers a world of opportunity to help grow your business. But for the unprepared, selling online or even just using email can bring significant security risks. Taking onli

Add to Reading List

Source URL: professionalservicesonline.com.au

Language: English - Date: 2015-03-29 18:22:07
339Digital audio players / Smartphones / Mobile telecommunications / IOS / IPhone / Subscriber identity module / Tru / SMS / Prepaid mobile phone / Technology / Mobile technology / Electronics

CRITICAL INFORMATION SUMMARY AussieSim Prepaid travel SIM Card Combo and Nano - $49.95 Information about the service AussieSim is a prepaid SIM card for international travelers which lets you keep your existing Australia

Add to Reading List

Source URL: cdn.shopify.com

Language: English - Date: 2014-04-28 23:17:08
340Internet / Email / Identity management / Privacy of telecommunications / Privacy / Email encryption / Vormetric / WISeKey / Computing / Computer security / Internet privacy

Protected Trust® Acquires Privacy Assets Protected Trust®, the email encryption specialist based in Winter Haven, FL, has acquired additional privacy assets in a merger with three other digital security companies – I

Add to Reading List

Source URL: www.doculex.com

Language: English - Date: 2013-05-23 14:12:53
UPDATE