Mobile identity management

Results: 229



#Item
1Identity management / Privacy / National Health Service / Medical law / Medical privacy / Telecommunications data retention / Information privacy / NHS Connecting for Health / Internet privacy / England / Computing / United Kingdom

Waking Project Privacy Impact Assessment Description: Waking Project To develop an alerting service with alerts pushed to secure mobile devices carried by suitably qualified clinicians. Questions to identify Privacy Issu

Add to Reading List

Source URL: storage.googleapis.com

Language: English - Date: 2016-06-15 10:14:10
2Geolocation / Wireless / Technology / Privacy / Identity management / Mobile technology / Internet privacy / Location-based service / Peer-to-peer / Mobile phone tracking / WHOIS

PAD: Privacy-Area Aware, Dummy-Based Location Privacy in Mobile Services Hua Lu Christian S. Jensen Man Lung Yiu Department of Computer Science, Aalborg University, Denmark

Add to Reading List

Source URL: people.cs.aau.dk

Language: English - Date: 2008-06-04 07:04:54
3Smart cards / ISO standards / Ubiquitous computing / Identity documents / Computer access control / Security / Computing / Electronic identification / Card reader / Citizen Card / Subscriber identity module / Mobile identity management

Therefore two different PINs (personal identification numbers) are needed: The Citizen Card Concept The Austrian Citizen Card is your Swiss Army knife for security in electronic communication with authorities

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2006-02-02 08:41:35
4Computer access control / Computer security / Identity / Federated identity / Identity management / Authentication / Security token / Digital identity / OpenID / Phishing / Electronic authentication / Mobile signature

Your Contact is Jason Blum (CEO) +Neunbrunnenstrasse 33 | CH-8050 Zürich www.synacts.com www.digitalid.net

Add to Reading List

Source URL: www.synacts.com

Language: English - Date: 2016-08-02 05:40:35
5Computing / Software / Cloud computing / Identity management / Smartphones / Computer access control / Mobile app / Credential / App store / Amazon Web Services / Android / Google Play

Harvesting Developer Credentials in Android Apps Yajin Zhou† , Lei Wu† , Zhi Wang‡ , Xuxian Jiang? † North Carolina State University

Add to Reading List

Source URL: yajin.org

Language: English - Date: 2016-06-04 10:52:06
6Identity management / Computer access control / Computer security / Identity / Electronic identification / Authentication / Mobile signature / Recommender system / Multi-factor authentication / Digital identity / Privacy

Microsoft Word - SSEDIC Outcomes Y3 WP6_3v1 6.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:04
7Security / Secure communication / Prevention / Data security / Data breach / Identity theft / Electronic health record / Computer security / Health Insurance Portability and Accountability Act / Mobile device management / Information privacy / Mobile app

stethoscope on keyboard laptop

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2016-01-25 16:10:03
8Computer access control / Identity management / Federated identity / Security token / Mobile signature / Password / Authentication / Public key infrastructure / Multi-factor authentication / Mobile identity management / OpenID / Subscriber identity module

Keyhub_Technical_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-13 04:56:07
9ISO standards / Ubiquitous computing / Identity management / Smart card / Identity document / Citizen Card / Mobile signature

eSignatures in Austria Herbert Leitold Reykjavik; May 23rd, 2013 Zentrum für sichere Informationstechnologie - Austria

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2013-05-23 09:32:41
10Computer access control / Public-key cryptography / Identity management / Mobile signature / Signature / Security token / Public key infrastructure / Authentication / 3-D Secure / Electronic authentication / Disk encryption

Keyhub_Product_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-10 04:15:28
UPDATE