Digital identity

Results: 1391



#Item
961Access control / Identity / National security / Committee on National Security Systems / Authentication / Digital identity / Interoperability / Security / Computer security / Identity management

National Directive for the Implementation and Operation of Identity, Credential, and Access Management Capabilities on the US Federal Secret Fabric

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-08-01 09:43:52
962Department of Health / Human Fertilisation and Embryology Authority / Reproduction / Biology / Donor conceived person / Identity document / Sibling / Father / Digital subscriber line / Family / Behavior / Cloning

Application to join the Donor Sibling Link Donor-conceived individuals Use this form if you are donor-conceived and would like to share or receive contact details of your

Add to Reading List

Source URL: www.hfea.gov.uk

Language: English - Date: 2014-10-02 08:34:18
963Boneh/Franklin scheme / Standard model / Digital signature / Secure channel / Information security / Key distribution / Cryptography / ID-based encryption / Public-key cryptography

NEW SECURITY NOTIONS FOR IDENTITY BASED ENCRYPTION By Sriramkrishnan Srinivasan

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-04-11 06:48:31
964Interlibrary loan / Identity document / Security / Science / Library science / World Digital Library / Library

sp裏表紙_新登録利用者制度_20120612

Add to Reading List

Source URL: www.ndl.go.jp

Language: English - Date: 2012-09-23 22:43:53
965Internet privacy / Malware / Privacy / Social networking service / Digital self-defense / Password manager / Ethics / Identity management / Password

While interacting on a social network site … Protect your Personal Information (PI) Accessing social networking sites Using Your Computer Share the minimum amount of Personal Information (P I) : never share passwords

Add to Reading List

Source URL: www.rbc.com

Language: English - Date: 2013-10-03 09:30:48
966Digital audio / IPhone software / IPod software / ITunes / IOS / Software / Media technology / Application software

iTunes U Identity Guidelines September 2013 Contents

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2014-03-04 05:21:05
967Electronics / Nokia / Subscriber identity module / OMA DRM / Digital rights management / Symbian / Ovi / Universal Mobile Telecommunications System / Nokia N900 / Smartphones / Technology / Electronic engineering

Nokia E73 User Guide Issue 2.0 Contents Safety...........................................4

Add to Reading List

Source URL: www.knfbreader.com

Language: English - Date: 2010-08-22 01:21:27
968Notary public / Credible witness / Digital signature / Witness / Act / Identity document / Signature / Certified copy / Law / Civil law / Notary

California Secretary of State Valid Identification (Notary) When completing a certificate of acknowledgment or a jurat, a notary public is required to certify to the identity of the signer of the document. (Civil Code s

Add to Reading List

Source URL: www.pasadena.edu

Language: English - Date: 2011-11-02 20:35:23
969Identity theft / Digital media / Abberley / Grand Theft Auto IV / Application software / Crimes / Identity / Theft

identity-misuse-focus-group

Add to Reading List

Source URL: www.police.govt.nz

Language: English - Date: 2013-10-17 19:35:35
970Internet / Federated identity / Digital media / Web 2.0 / Webmail / Email / Password / Computing

Law Firm Administrator Documentation

Add to Reading List

Source URL: www.taylorclerk.com

Language: English - Date: 2011-12-21 13:06:37
UPDATE