Digital identity

Results: 1391



#Item
371Crimes / Theft / Identity theft / Credit / Internet privacy / Privacy / TransUnion / Digital identity / Personally identifiable information / Identity / Ethics / Security

PrivacyArmor_Voluntary_25K_NoStartingDate_Effective2014

Add to Reading List

Source URL: infoarmor.com

Language: English - Date: 2014-10-10 15:14:29
372Social psychology / Security / Conceptions of self / Identity / Positive mental attitude / Digital identity / Psychology of self / Self-esteem / Internet privacy / Ethics / Identity management / Privacy

IRIE International Review of Information Ethics VolAnna-Maria Piskopani:

Add to Reading List

Source URL: www.i-r-i-e.net

Language: English - Date: 2013-08-01 10:09:07
373Public key certificate / Identity document / Digital signature / Electronic identity card / Cryptography / Key management / Public-key cryptography

NB: This is an unofficial translation! Act on Electronic Service in the AdministrationChapter 1 General provisions

Add to Reading List

Source URL: www.finlex.fi

Language: English
374RSA / Ring signature / BLS / Schnorr signature / Strong RSA assumption / Model theory / Forking lemma / Group signature / Blind signature / Cryptography / Public-key cryptography / Digital signature

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 04:48:54
375Digital signature / Group signature / Proof of knowledge / Designated verifier signature / Zero-knowledge proof / RSA / Ring signature / IP / NP / Cryptography / Public-key cryptography / Cryptographic protocols

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti  

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-05 21:04:21
376Combinatorics / Dynamic programming / Formal languages / Family name / Genealogy / Suffix tree / Longest common substring problem / Suffix array / Substring / Computing / Surnames / Technology

The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling Muhammad Adnan Antonio Lima

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2015-03-30 09:11:09
377Federated identity / Digital identity / Digital technology / Identity / Authentication / World Wide Web / Security / Identity management / Computer security

Identity in the Browser - Avoiding Common Flaws Position paper for W3C Workshop on Identity in the Browser, 2011 Brad Hill (independent) Position The author is an independent expert on the subject of s

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2011-05-12 17:26:02
378Internet privacy / Information privacy / Personally identifiable information / Ethics / Privacy / Identity management

article We’re Not Targeting You... For the digital economy to grow, legislators must adopt more nuanced approaches to data and privacy.

Add to Reading List

Source URL: www.mediacom.com

Language: English - Date: 2013-06-10 08:24:49
379Internet privacy / Privacy / Internet access / CTIA – The Wireless Association / Telecommunications data retention / Ethics / Identity management / Social issues

the future of digital trust A European study on the nature of consumer trust and personal data February 2014 2

Add to Reading List

Source URL: www.orange.com

Language: English
380Federated identity / Computer network security / Abstraction / Identity assurance / Digital identity / National Strategy for Trusted Identities in Cyberspace / Security / Identity management / Identity / Computer security

st London 1 November 2012 Press Release

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
UPDATE