Identity intelligence

Results: 296



#Item
21Ubiquitous computing / User interface techniques / Computing / Humancomputer interaction / Data mining / Identity / Identity management / Profiling / Ambient intelligence / Context awareness / Smart environment / Bluetooth

Location Based Services and Ubiquitous Environments Georg Gartner Como, 2010

Add to Reading List

Source URL: webmgs2010.como.polimi.it

Language: English - Date: 2010-09-21 08:00:31
22Computer access control / Legal research / LexisNexis / Open-source intelligence / Reed Elsevier / RELX Group / Identity theft / Authentication / Identity management

White Paper Proving Identity Using LexisNexis® Identity Management Solutions Do you know who you’re talking to? Validate and authenticate identities with more confidence.

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:06
23Identity / Identity management / Intelligence / Military terminology / Biometrics / Battlespace / Military intelligence / Defense Intelligence Agency / Secretaría de Inteligencia / National security / Security / Military science

United States Army IDENTITY OPERATIONS FOR STRATEGIC

Add to Reading List

Source URL: www.tradoc.army.mil

Language: English
24Espionage / Identity management / Law / Privacy / Central Intelligence Agency / Internet privacy / Julian Assange / Intelligence agency / United States Intelligence Community / Ethics / National security / WikiLeaks

THE DITCHLEY FOUNDATION Intelligence, security and privacyMay 2015 In partnership with the American Ditchley Foundation Chair: Sir John Scarlett KCMG OBE A combination of renewed terrorism threats and the Assange

Add to Reading List

Source URL: www.ditchley.co.uk

Language: English - Date: 2014-10-09 12:18:02
25Sun Secure Global Desktop / Mobile business intelligence / Cryptographic protocols / Secure communication / Electronic commerce

m-Identity Protection Trusted Web View The secured browser access for your app!

Add to Reading List

Source URL: www.kobil.com

Language: English - Date: 2015-04-27 11:54:04
26Law / Internet privacy / Information privacy / Personally identifiable information / Ambient intelligence / Disruptive Technology Office / P3P / Privacy regulation theory / Ethics / Privacy / Identity management

Results of Workshops on Privacy Protection Technologies Carl Landwehr IARPA Office of the Director of National Intelligence Washington, DC

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-20 15:22:35
27Two-factor authentication / Multi-factor authentication / Password / Biometrics / Authentication / Identity management / Mobile business intelligence / Security token / Security / Access control / Computer security

Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security

Add to Reading List

Source URL: delfigosecurity.com

Language: English
28Demographics of Newfoundland and Labrador / Indian general election full results

Recognizing City Identity via Attribute Analysis of Geo-tagged Images Bolei Zhou1 , Liu Liu2 , Aude Oliva1 , and Antonio Torralba1 1 Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-07-07 12:04:52
29Digital television / Information technology / Networked and Electronic Media / Science and technology in Europe / Ambient intelligence / Identity management / Social networking service / Technological convergence / Service-oriented architecture / Technology / Electronics / Computing

Current Version of Strategic Research Agenda “Networked and Electronic Media” European Technology Platform www.nem-initiative.org

Add to Reading List

Source URL: nem-initiative.org

Language: English - Date: 2014-01-09 04:50:02
30Privacy / Internet privacy / Ubiquitous computing / Cloud computing / Information privacy / Privacy Office of the U.S. Department of Homeland Security / Ethics / Identity management / Law

PRIVACY THREATS IN UBIQUITOUS COMPUTING (PTUC) 1st International Workshop on Privacy Threats in Ubiquitous Computing In Conjunction with the 12th IEEE International Conference on Ubiquitous Intelligence and Computing (U

Add to Reading List

Source URL: www.cybermatics.org

Language: English
UPDATE