Identity element

Results: 42



#Item
1

philip jones During the half-century from the 1890s to the 1940s, the theme of the ‘bush’ emerged as a formative element in a new Australian identity. Assumptions about the Central Australian frontier and its people

Add to Reading List

Source URL: www.wakefieldpress.com.au

Language: English - Date: 2011-05-12 00:10:16
    2

    Sarcophagus S. Maria Antiqua: Some Comments on Reception as an Element of Identity in Late Antique and Early Christian Sarcophagi Adriana Kapsreiter, Berlin The research field of late antique and early Christian sarcoph

    Add to Reading List

    Source URL: www.visualpast.de

    - Date: 2016-05-24 10:50:29
      3Mobile telecommunications / LTE / Mobile technology / Telecommunications / Videotelephony / IP Multimedia Services Identity Module / Subscriber identity module / Universal Integrated Circuit Card / IP Multimedia Subsystem / UMTS / System Architecture Evolution / GSM

      SIMalliance LTE UICC profile This document is a collection of requirements for optimal support of LTE/EPS networks by UICC Secure element architects for today’s generation SIMalliance LTE UICC profile

      Add to Reading List

      Source URL: simalliance.org

      Language: English - Date: 2015-03-26 18:46:30
      4Data management / Knowledge representation / Records management / Federated identity / Attribute / Open Identity Exchange / Metadata / HTML element / Data element

      Word Template for CSD white papers

      Add to Reading List

      Source URL: www2.nist.gov

      Language: English - Date: 2016-05-19 13:36:32
      5Mobile telecommunications / Smart cards / LTE / UMTS / (U)SIM interface / Telecommunications / Subscriber identity module / Universal Integrated Circuit Card / IP Multimedia Services Identity Module / Single Wire Protocol / Near field communication / 3GPP

      Device Implementation Guidelines June 2013 Secure element architects for today’s generation

      Add to Reading List

      Source URL: simalliance.org

      Language: English - Date: 2015-03-26 18:46:30
      6Information privacy / Digital rights / Human rights / Identity management / Law / Privacy / Differential privacy / Element / Internet privacy / Draft:Sub-linear time algorithm / Digital media / Information

      Differentially Private Billing with Rebates George Danezis1 , Markulf Kohlweiss1 , and Alfredo Rial2 1 Microsoft Research {gdane,markulf}@microsoft.com

      Add to Reading List

      Source URL: research.microsoft.com

      Language: English - Date: 2011-02-02 10:27:09
      7Finite groups / Sylow theorems / Index of a subgroup / Normal subgroup / P-group / Abelian group / Quotient group / Group / Coset / Abstract algebra / Algebra / Group theory

      Groups Groups and subgroups Definitions A group G is a set equipped with an associative binary operation, an identity element for this operation, and which has inverses. A subgroup H ≤ G is a subset closed under the gr

      Add to Reading List

      Source URL: www.jchl.co.uk

      Language: English - Date: 2001-10-24 15:32:37
      8Equality rights / Ethics / Inequality / Disability rights / Equality and diversity / Diversity / Gender equality / Equal opportunity / Equality Act / Affirmative action / Discrimination / Identity politics

      LONDON SCHOOL OF HYGIENE & TROPICAL MEDICINE EQUALITY & DIVERSITY STRATEGY The School embraces and values the diversity of its staff and student population and seeks to promote equality as an essential element in enhanc

      Add to Reading List

      Source URL: www.lshtm.ac.uk

      Language: English - Date: 2015-05-02 20:55:28
      9Algebraic structures / Inverse element / Semigroup theory / Inverse function / Identity element / Inverse limit / Monoid / Mathematics / Algebra / Abstract algebra

      Microsoft Word - BinaryOperations912quiz.doc

      Add to Reading List

      Source URL: www.mathworksheetscenter.com

      Language: English - Date: 2008-07-30 16:24:41
      10Software / Identity management / XACML / Attribute grammar / Attrib / HTML element / Access control / Immutable object / Information security / Computing / Security / Computer security

      risk-aware-usage-control.dvi

      Add to Reading List

      Source URL: wwwold.iit.cnr.it

      Language: English - Date: 2011-08-10 05:58:47
      UPDATE