21![Location Based Services and Ubiquitous Environments Georg Gartner Como, 2010 Location Based Services and Ubiquitous Environments Georg Gartner Como, 2010](https://www.pdfsearch.io/img/b1fe1e109ac2909fb4430a9d9341a91f.jpg) | Add to Reading ListSource URL: webmgs2010.como.polimi.itLanguage: English - Date: 2010-09-21 08:00:31
|
---|
22![White Paper Proving Identity Using LexisNexis® Identity Management Solutions Do you know who you’re talking to? Validate and authenticate identities with more confidence. White Paper Proving Identity Using LexisNexis® Identity Management Solutions Do you know who you’re talking to? Validate and authenticate identities with more confidence.](https://www.pdfsearch.io/img/dcaaa97c9c527ef2316075f9ee96db84.jpg) | Add to Reading ListSource URL: lexisnexis.comLanguage: English - Date: 2014-10-15 08:44:06
|
---|
23![United States Army IDENTITY OPERATIONS FOR STRATEGIC United States Army IDENTITY OPERATIONS FOR STRATEGIC](https://www.pdfsearch.io/img/7014db15058d75b74d15ffc06b6ff426.jpg) | Add to Reading ListSource URL: www.tradoc.army.milLanguage: English |
---|
24![THE DITCHLEY FOUNDATION Intelligence, security and privacyMay 2015 In partnership with the American Ditchley Foundation Chair: Sir John Scarlett KCMG OBE A combination of renewed terrorism threats and the Assange THE DITCHLEY FOUNDATION Intelligence, security and privacyMay 2015 In partnership with the American Ditchley Foundation Chair: Sir John Scarlett KCMG OBE A combination of renewed terrorism threats and the Assange](https://www.pdfsearch.io/img/b4af97fc6beda7f8a684ebe1a46c962d.jpg) | Add to Reading ListSource URL: www.ditchley.co.ukLanguage: English - Date: 2014-10-09 12:18:02
|
---|
25![m-Identity Protection Trusted Web View The secured browser access for your app! m-Identity Protection Trusted Web View The secured browser access for your app!](https://www.pdfsearch.io/img/e5e0a995b3a89dd6a93f768666c8bfe5.jpg) | Add to Reading ListSource URL: www.kobil.comLanguage: English - Date: 2015-04-27 11:54:04
|
---|
26![Results of Workshops on Privacy Protection Technologies Carl Landwehr IARPA Office of the Director of National Intelligence Washington, DC Results of Workshops on Privacy Protection Technologies Carl Landwehr IARPA Office of the Director of National Intelligence Washington, DC](https://www.pdfsearch.io/img/f565844212af0fe483ad9011ab04787a.jpg) | Add to Reading ListSource URL: www.landwehr.orgLanguage: English - Date: 2014-08-20 15:22:35
|
---|
27![Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security](https://www.pdfsearch.io/img/2e47f8b3666e32667cc3ebad7e788509.jpg) | Add to Reading ListSource URL: delfigosecurity.comLanguage: English |
---|
28![Recognizing City Identity via Attribute Analysis of Geo-tagged Images Bolei Zhou1 , Liu Liu2 , Aude Oliva1 , and Antonio Torralba1 1 Computer Science and Artificial Intelligence Laboratory Recognizing City Identity via Attribute Analysis of Geo-tagged Images Bolei Zhou1 , Liu Liu2 , Aude Oliva1 , and Antonio Torralba1 1 Computer Science and Artificial Intelligence Laboratory](https://www.pdfsearch.io/img/f7e0410103a3a6b120381e1563acbe00.jpg) | Add to Reading ListSource URL: people.csail.mit.eduLanguage: English - Date: 2014-07-07 12:04:52
|
---|
29![Current Version of Strategic Research Agenda “Networked and Electronic Media” European Technology Platform www.nem-initiative.org Current Version of Strategic Research Agenda “Networked and Electronic Media” European Technology Platform www.nem-initiative.org](https://www.pdfsearch.io/img/90edeabeb4592ed8cd01abf7f0cfbd6c.jpg) | Add to Reading ListSource URL: nem-initiative.orgLanguage: English - Date: 2014-01-09 04:50:02
|
---|
30![PRIVACY THREATS IN UBIQUITOUS COMPUTING (PTUC) 1st International Workshop on Privacy Threats in Ubiquitous Computing In Conjunction with the 12th IEEE International Conference on Ubiquitous Intelligence and Computing (U PRIVACY THREATS IN UBIQUITOUS COMPUTING (PTUC) 1st International Workshop on Privacy Threats in Ubiquitous Computing In Conjunction with the 12th IEEE International Conference on Ubiquitous Intelligence and Computing (U](https://www.pdfsearch.io/img/a826b7b9138411e813c63f800f131782.jpg) | Add to Reading ListSource URL: www.cybermatics.orgLanguage: English |
---|