Digital identity

Results: 1391



#Item
621Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Public-key cryptography / Tor / Identity management / Cryptography / Identity / Internet privacy

- 14 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-09 04:02:00
622Anonymity / Pseudonymity / Cryptographic software / Crowds / Pseudonym / Tor / Digital identity / Public-key cryptography / Email / Cryptography / Internet privacy / Identity

- 23 - Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2005-07-28 09:22:20
623Online chat / Digital audio players / Smartphones / Telephony / Mobile telecommunications / Text messaging / IPhone / International Mobile Equipment Identity / Tru / Technology / Software / Electronics

PERFORMANCE EVALUATION RATING FORM

Add to Reading List

Source URL: www.uams.edu

Language: English - Date: 2013-10-16 16:09:47
624Digital media / Computing / HCard / Social networking service / Internet / Federated identity / Technology / OpenID

What is your provenance? Gavin Bell 1

Add to Reading List

Source URL: gavinbell.com

Language: English - Date: 2014-09-05 09:35:15
625Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Tor / Public-key cryptography / Identity management / Cryptography / Identity / Internet privacy

- 16 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-08-19 04:30:47
626Anonymity / Pseudonymity / Cryptographic software / Pseudonym / Crowds / Digital identity / Tor / Public-key cryptography / Identity management / Cryptography / Identity / Internet privacy

- 16 - Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-22 03:49:28
627ID-based encryption / ID-based cryptography / Key distribution / Public key infrastructure / Digital signature / Man-in-the-middle attack / Key / Cryptography / Key management / Public-key cryptography

An Identity-Based Key Infrastructure Suitable for Messaging and Its Application to E-mail ∗ Ay¸se Gül Karatop

Add to Reading List

Source URL: research.sabanciuniv.edu

Language: English - Date: 2008-11-07 06:20:13
628Privacy law / Human rights / Internet privacy / Identity document / Privacy / Family Educational Rights and Privacy Act / Digital signature / Cryptography / Ethics / Security

REQUEST TO PREVENT RELEASE OF INFORMATION

Add to Reading List

Source URL: www.wright.edu

Language: English - Date: 2012-02-03 16:18:05
629Information / Shin Megami Tensei: Persona / Authentication / Identity management / Unique identifier / Identifier / Digital identity / Security / Identity / Computer security

Identity Commandments “Identity” Commandments ® The Jericho Forum Identity, Entitlement & Access Management (IdEA) Commandments define the

Add to Reading List

Source URL: collaboration.opengroup.org

Language: English - Date: 2011-05-09 10:49:05
630Digital audio / ITunes / IPhone software / IPod software / IPod / RSS / Cadastro de Pessoas Físicas / Podcast / Software / Media technology / Application software

iTunes U Guidelines Creating your iTunes U site Apple_Logo_black_Aprvd_7[removed]ai Condensed red (PMS 485) logo for new identity Approved by Peggy Jensen[removed]

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2014-11-12 08:53:16
UPDATE