Digital identity

Results: 1391



#Item
421Eastern Michigan University

Thursday, January 29th Creating & Curating Curating Your Digital Identity as an Academic A Workshop for Graduate Students Michigan State University | Department of Teacher Education

Add to Reading List

Source URL: mschirahagerman.files.wordpress.com

Language: English - Date: 2015-01-30 17:32:47
    422Digital audio / ITunes / IPhone software / IPod software / IPod / RSS / Cadastro de Pessoas Físicas / Podcast / Software / Media technology / Application software

    iTunes U Guidelines Creating your iTunes U site Apple_Logo_black_Aprvd_7[removed]ai Condensed red (PMS 485) logo for new identity Approved by Peggy Jensen[removed]

    Add to Reading List

    Source URL: www.apple.com

    Language: English - Date: 2014-03-04 05:22:01
    423Privacy / Identity management / Social issues / Digital media / Technology / Internet privacy / Privacy policy / Internet / Peer-to-peer / Ethics / File sharing networks / Internet ethics

    Research issues raised by edge services Sally Floyd WCW 2002 August 15, 2002 Three topics:

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2002-08-15 10:45:38
    424Identity document / Identity assurance / Smart card / Biometrics / Access control / Computer security / Identity theft / Anakam / Digital identity / Security / Identity management / Identity

    Corporate Profile n n n n

    Add to Reading List

    Source URL: www.nextgenid.com

    Language: English - Date: 2014-10-22 12:29:00
    425Secure Digital / Exchange ActiveSync / Smartphones / Espionage / Technology / Subscriber identity module / Security / Globally unique identifier

    Sony Mobile Communications AB

    Add to Reading List

    Source URL: www.spark.co.nz

    Language: English
    426Notary / Escrow / Digital signature / Key escrow / Authentication / Cryptography / Key management / Public-key cryptography

    CS255 Programming Project: The Authenticator The project focuses on Anonymous Authentication. Our objective is to enable a person to authenticate himself to a service without revealing his identity. For example, the Wal

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 1999-02-20 01:28:17
    427Technology / Digital media / Yad Vashem / Email / Jewish culture

    International Institute for Holocaust Research Yad Vashem “Non-Jewish Jews” During the Shoah: Fate and Identity SUMMER WORKSHOP APPLICATION FORM

    Add to Reading List

    Source URL: www.yadvashem.org

    Language: English - Date: 2015-03-02 08:15:41
    428Identity / Digital technology / Crimes / Identity theft / Theft / Internet privacy / Privacy / Internet / Social networking service / Technology / Digital media / Ethics

    DOC Document

    Add to Reading List

    Source URL: privacy.org.nz

    Language: English - Date: 2014-09-24 22:14:59
    429Security / Computer security / Identity assurance / Access control / National Strategy for Trusted Identities in Cyberspace / OpenID / Digital identity / Internet privacy / Authentication / Identity / Identity management / Federated identity

    CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

    Add to Reading List

    Source URL: www.bits.org

    Language: English - Date: 2012-11-14 16:45:11
    430Virtual world / Adolescence / Educational game / Digital media / Application software / Electronic games / Game based learning / Video game controversies / Educational psychology / Video game / Gamer

    June 21, 2013 NewKnowledge Report # NSF1[removed]Youth Identity, Science Learning and Gaming Experiences

    Add to Reading List

    Source URL: www.newknowledge.org

    Language: English - Date: 2014-09-02 15:08:46
    UPDATE