Digital identity

Results: 1391



#Item
391Identity management / Direct Anonymous Attestation / Internet privacy / Credential / Science / IBM Zurich Research Laboratory / IBM / Digital credential / Cryptography / Computing / Technology

Template release: Oct 02 For the latest, go to http://w3.ibm.com/ibm/presentations Indications in green = Live content Indications in white = Edit in master logo must not be

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:15:00
392Identity management / Public-key cryptography / Cryptographic protocols / Security Assertion Markup Language / Digital identity / OpenID / X.509 / Internet privacy / Assertion / Cryptography / Federated identity / Computer security

Selective Disclosure (v0.2) Ben Laurie () May 11, 2007 Abstract

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2007-05-11 06:26:34
393Lavasoft / Key / Encrypting File System / Encryption software / Cryptography / Cryptographic software / Disk encryption

DIGITAL LOCK Secure your files against identity theft! In our digital world, vast amounts of information is stored on our computers, and passed back and forth. Your files, both at home and at the office, are a trove of p

Add to Reading List

Source URL: lavasoft.com

Language: English - Date: 2011-12-19 07:14:44
394Identity management / Computing / OpenID / Web services / Phorm / Identity assurance / Digital identity / Information Card / ICAM / Federated identity / Identity / Computer security

Trust Framework Provider Assessment PackageThis document comprises the Assessment Package submitted by the Open Identity Exchange Corporation (OIX) to the United States Office of Governmentwide Policy (OGP) p

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
395Human–computer interaction / Wireless / Ubiquitous computing / Automatic identification and data capture / MIFARE / Contactless payment / FeliCa / Suica / Proximity card / Technology / Radio-frequency identification / Electronic engineering

A graphic language for touch RFID and everyday objects Radio Frequency IDentification (RFID) is a means of giving physical objects a unique digital identity. Most current RFID applications focus on replacing barcodes

Add to Reading List

Source URL: www.elasticspace.com

Language: English - Date: 2007-10-08 07:55:51
396Education / Computing / Virtual reality / Identity / Virtual world / Federated identity management / Moodle / E-learning / Digital identity / Software / Identity management / Federated identity

Cruz, G., Costa, A., Martins, P., Gonçalves, R., & Barroso, JToward Educational Virtual Worlds: Should Identity Federation Be a Concern? Educational Technology & Society, 18(1), 27–36. Toward Educational Vir

Add to Reading List

Source URL: www.ifets.info

Language: English - Date: 2015-03-16 22:09:22
397Electronic commerce / Financial cryptography / Digital credential / Credential / Electronic authentication / Digital signature / Blind signature / Cryptographic protocol / Authentication / Cryptography / Identity management / Public-key cryptography

A Technical Overview of Digital Credentials Dr. Stefan Brands Credentica February 20, 2002 Abstract

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2007-02-16 10:07:45
398Ethics / Federated identity / Law / Privacy / Liberty Alliance / Internet privacy / Personally identifiable information / Biometrics / Digital identity / Security / Identity management / Identity

identity in digital government a research report of the Digital Government

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2012-09-28 13:31:09
399Identity management / Identity / Key management / Public-key cryptography / Information Card / Windows CardSpace / Identity management system / Public key certificate / Digital identity / Cryptography / Security / Federated identity

Oxford Internet Institute Conference – Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities 8th-10th September 2005 Identity Management as a Cybersecurity Case Study By Mary Rundle and

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:35
400Internet Society / Digital media / Digital technology / Computing / Internet governance / Internet / Internet standards

Trust and Identity Initiative Trust and Identity The Internet Society promotes work that improves trust in the

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2009-03-30 09:17:37
UPDATE