Identity intelligence

Results: 296



#Item
21Location Based Services and Ubiquitous Environments Georg Gartner Como, 2010

Location Based Services and Ubiquitous Environments Georg Gartner Como, 2010

Add to Reading List

Source URL: webmgs2010.como.polimi.it

Language: English - Date: 2010-09-21 08:00:31
22White Paper  Proving Identity Using LexisNexis® Identity Management Solutions Do you know who you’re talking to? Validate and authenticate identities with more confidence.

White Paper Proving Identity Using LexisNexis® Identity Management Solutions Do you know who you’re talking to? Validate and authenticate identities with more confidence.

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:06
23United States Army  IDENTITY OPERATIONS FOR STRATEGIC

United States Army IDENTITY OPERATIONS FOR STRATEGIC

Add to Reading List

Source URL: www.tradoc.army.mil

Language: English
24THE DITCHLEY FOUNDATION Intelligence, security and privacyMay 2015 In partnership with the American Ditchley Foundation Chair: Sir John Scarlett KCMG OBE A combination of renewed terrorism threats and the Assange

THE DITCHLEY FOUNDATION Intelligence, security and privacyMay 2015 In partnership with the American Ditchley Foundation Chair: Sir John Scarlett KCMG OBE A combination of renewed terrorism threats and the Assange

Add to Reading List

Source URL: www.ditchley.co.uk

Language: English - Date: 2014-10-09 12:18:02
25m-Identity Protection Trusted Web View The secured browser access for your app!

m-Identity Protection Trusted Web View The secured browser access for your app!

Add to Reading List

Source URL: www.kobil.com

Language: English - Date: 2015-04-27 11:54:04
26Results of Workshops on Privacy Protection Technologies Carl Landwehr IARPA Office of the Director of National Intelligence Washington, DC

Results of Workshops on Privacy Protection Technologies Carl Landwehr IARPA Office of the Director of National Intelligence Washington, DC

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-20 15:22:35
27Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security

Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security

Add to Reading List

Source URL: delfigosecurity.com

Language: English
28Recognizing City Identity via Attribute Analysis of Geo-tagged Images Bolei Zhou1 , Liu Liu2 , Aude Oliva1 , and Antonio Torralba1 1  Computer Science and Artificial Intelligence Laboratory

Recognizing City Identity via Attribute Analysis of Geo-tagged Images Bolei Zhou1 , Liu Liu2 , Aude Oliva1 , and Antonio Torralba1 1 Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-07-07 12:04:52
29Current Version of  Strategic Research Agenda “Networked and Electronic Media” European Technology Platform www.nem-initiative.org

Current Version of Strategic Research Agenda “Networked and Electronic Media” European Technology Platform www.nem-initiative.org

Add to Reading List

Source URL: nem-initiative.org

Language: English - Date: 2014-01-09 04:50:02
30PRIVACY THREATS IN UBIQUITOUS COMPUTING (PTUC)  1st International Workshop on Privacy Threats in Ubiquitous Computing In Conjunction with the 12th IEEE International Conference on Ubiquitous Intelligence and Computing (U

PRIVACY THREATS IN UBIQUITOUS COMPUTING (PTUC) 1st International Workshop on Privacy Threats in Ubiquitous Computing In Conjunction with the 12th IEEE International Conference on Ubiquitous Intelligence and Computing (U

Add to Reading List

Source URL: www.cybermatics.org

Language: English