Identity change

Results: 894



#Item
411Key management / Identity document / Name change / Deed / Passport / Birth certificate / Public key certificate / Cryptography / Security / Government

Withdrawal Revocation Relationship

Add to Reading List

Source URL: www.justice.tas.gov.au

Language: English - Date: 2014-02-16 18:15:08
412Behavioural sciences / Human–computer interaction / Persuasive technology / Attitude / Rhetoric / Advertising / Social psychology / Persuasion / Attitude change

personal_identity ecology

Add to Reading List

Source URL: www.iftf.org

Language: English - Date: 2014-07-03 01:32:08
413Federated identity / Identity management systems / Enterprise application integration / Message-oriented middleware / Microsoft BizTalk Server / Middleware / Single sign-on / Password Change Notification Service / Password synchronization / System software / Information technology management / Software

DOC Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2005-02-02 23:06:39
414Transgender / Transsexualism / Sex reassignment surgery / Gender identity / Same-sex marriage / Eliezer Waldenberg / Sex change / Gender / Gender transitioning / Surgical procedures

Committee on Jewish Law and Standards of the Rabbinical Assembly YD[removed]Status Of Transsexuals1 RABBI MAYER E. RABINOWITZ This paper was approved by the CJLS on December 3, 2003, by a vote of ten in favor, 2 opposse

Add to Reading List

Source URL: www.rabbinicalassembly.org

Language: English - Date: 2013-09-18 22:22:38
415Environmental social science / Business ethics / Sustainable architecture / Sustainable development / Corporate social responsibility / Natural capital / Brundtland Commission / Sustainable business / Sustainability organizations / Environment / Sustainability / Environmental economics

Introduction Business and industry — not just American business and industry, but global business and industry — must change its ways to survive ... And by survive I do not mean maintain identity and integrity within

Add to Reading List

Source URL: admin.csrwire.com

Language: English - Date: 2012-03-27 17:09:48
416Computing / Cryptographic software / Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Troll / Cryptography / Internet / Internet privacy

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.15 and all succeeding versions) Change Histor

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-16 03:22:41
417Anonymity / Pseudonymity / Degree of anonymity / Tor / Pseudonym / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions) Change History

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-09-20 02:12:55
418Internet / Computing / Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Tor / Troll / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions) Change History

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-08-19 04:31:35
419Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Tor / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/Literatur_V1.shtml (v0.5 and all succeeding versions) Change History

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-09-03 04:10:42
420Anonymity / Pseudonymity / Degree of anonymity / Pseudonym / Public-key cryptography / Tor / Email / Cryptography / Internet privacy / Cryptographic software

Anonymity, Unobservability, Pseudonymity, and Identity Management – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Draft v0.2

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-07-16 02:50:25
UPDATE