<--- Back to Details
First PageDocument Content
Identity / Computer network security / Two-factor authentication / Password / Authentication / Virtual private network / Digital identity / Security token / Mobile identity management / Security / Computer security / Identity management
Date: 2015-03-12 04:50:20
Identity
Computer network security
Two-factor authentication
Password
Authentication
Virtual private network
Digital identity
Security token
Mobile identity management
Security
Computer security
Identity management

Add to Reading List

Source URL: www.gsma.com

Download Document from Source Website

File Size: 411,62 KB

Share Document on Facebook

Similar Documents

Identity management / Privacy / National Health Service / Medical law / Medical privacy / Telecommunications data retention / Information privacy / NHS Connecting for Health / Internet privacy / England / Computing / United Kingdom

Waking Project Privacy Impact Assessment Description: Waking Project To develop an alerting service with alerts pushed to secure mobile devices carried by suitably qualified clinicians. Questions to identify Privacy Issu

DocID: 1quav - View Document

Geolocation / Wireless / Technology / Privacy / Identity management / Mobile technology / Internet privacy / Location-based service / Peer-to-peer / Mobile phone tracking / WHOIS

PAD: Privacy-Area Aware, Dummy-Based Location Privacy in Mobile Services Hua Lu Christian S. Jensen Man Lung Yiu Department of Computer Science, Aalborg University, Denmark

DocID: 1qqCz - View Document

Smart cards / ISO standards / Ubiquitous computing / Identity documents / Computer access control / Security / Computing / Electronic identification / Card reader / Citizen Card / Subscriber identity module / Mobile identity management

Therefore two different PINs (personal identification numbers) are needed: The Citizen Card Concept The Austrian Citizen Card is your Swiss Army knife for security in electronic communication with authorities

DocID: 1qmXf - View Document

Computer access control / Computer security / Identity / Federated identity / Identity management / Authentication / Security token / Digital identity / OpenID / Phishing / Electronic authentication / Mobile signature

Your Contact is Jason Blum (CEO) +Neunbrunnenstrasse 33 | CH-8050 Zürich www.synacts.com www.digitalid.net

DocID: 1pUw1 - View Document

Computing / Software / Cloud computing / Identity management / Smartphones / Computer access control / Mobile app / Credential / App store / Amazon Web Services / Android / Google Play

Harvesting Developer Credentials in Android Apps Yajin Zhou† , Lei Wu† , Zhi Wang‡ , Xuxian Jiang? † North Carolina State University

DocID: 1pSrY - View Document