Mobile identity

Results: 1060



#Item
131Public key infrastructure / Public-key cryptography / Computer security / Cyberwarfare / WISeKey / Security / Computer network security / Key management

m-Identity Protection Trusted App The security toolkit for your mobile app

Add to Reading List

Source URL: www.kobil.com

Language: English - Date: 2015-04-27 11:54:14
132Subscriber identity module / Roaming / Payment systems / GSM services / Electronic commerce / SIM lock / Credit card / Technology / Mobile technology / Prepaid mobile phone

T&Cs_TransatelDataSIM_march2015

Add to Reading List

Source URL: www.transatel-datasim.com

Language: English - Date: 2015-03-27 10:11:32
133Tunneling protocols / Computer architecture / Internet privacy / Internet protocols / Virtual private network / IPsec / Transport Layer Security / Computer network / Mobile virtual private network / Computer network security / Computing / Network architecture

2011 TAC and VPNs Extending Identity Beyond VPN Termination 1

Add to Reading List

Source URL: blackridge.us

Language: English - Date: 2012-07-25 14:33:52
134Marketing communications / Internet marketing / Advertising / Marketing operations / Marketing plan / Marketing / Business / Marketing strategy

EXTENSIVE EXPERIENCE INCLUDES: • development & implementation of corporate identity programs • social media plan & implementation • mobile website development

Add to Reading List

Source URL: www.touchstonemarketing.com

Language: English - Date: 2015-04-23 13:19:49
135Public-key cryptography / Federated identity / Identity management / Trusted path / Pubcookie / Cryptography / Key management / Public key infrastructure

m-Identity Protection Trusted Login The Login app on your mobile end devices

Add to Reading List

Source URL: www.kobil.com

Language: English - Date: 2015-04-27 11:53:01
136Electronics / International Mobile Equipment Identity / Mobile phone / .mobi / Electronic waste / Technology / Mobile telecommunications / Electronic engineering

Microsoft Word - COP Approved _4_.doc

Add to Reading List

Source URL: www.stoprecycledstolenphones.com

Language: English - Date: 2013-01-15 11:52:09
137Smart cards / Ubiquitous computing / Two-factor authentication / Bluetooth / Card reader / Universal Serial Bus / Security token / Gemalto / Computer hardware / Computing / Technology

m-Identity Protection Air+ Smart card security for the mobile world

Add to Reading List

Source URL: www.kobil.com

Language: English - Date: 2015-04-27 11:51:50
138Financial economics / Institutional investors / Electronic engineering / Mobile telecommunications / Insurance / Vehicle insurance / Identity theft / Prepaid mobile phone / Mobile phone / Technology / Financial institutions / Types of insurance

Private Banking Wordmark - Mono Positive

Add to Reading List

Source URL: www.lloydsbank.com

Language: English - Date: 2014-11-21 07:46:09
139Business organizations / Electronics / Open Mobile Alliance / Web development / 3GPP / Subscriber identity module / Content adaptation / OMA Presence SIMPLE / OMA DRM / Technology / Open standards / Mobile technology

Dictionary for OMA Specifications Approved Version 2.9 – 26 Jun 2012 Open Mobile Alliance OMA-ORG-Dictionary-V2_9A

Add to Reading List

Source URL: technical.openmobilealliance.org

Language: English - Date: 2013-09-23 01:05:10
140Electronics / Mobile broadband / Hutchison 3G / Subscriber identity module / Modem / SMS / Mobilicity / Wind Mobile / Technology / Mobile technology / Broadband

Data Mobile Broadband Freedom to work from any location, flexibility of plans packed with value and backed by a quality network provider... what more do you need! With Mobile Broadband capability you’re no longer chain

Add to Reading List

Source URL: mcmedia.com.au

Language: English
UPDATE