Mobile identity management

Results: 229



#Item
11Access control / Computer security / Identity management / Perimeter security / Physical security / Usability / Password / Internet privacy / User / Privacy concerns with social networking services / Mobile security

Lessons Learned From the Deployment of a Smartphone-Based Access-Control System Lujo Bauer Lorrie Faith Cranor

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-31 14:34:10
12Social networking services / Social networks / Identity management / Law / Privacy / Geosocial networking / Internet privacy / Location-based service / Foursquare / Recommender system / Targeted advertising / Mobile social network

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-18 08:40:35
13Mobile technology / Computer access control / Identity management / Security Assertion Markup Language / Mobile network operator / Diameter

An Integrated Accounting and Charging Architecture for Mobile Grids Cristian Morariu, Martin Waldburger, Burkhard Stiller

Add to Reading List

Source URL: gridnets.org

Language: English - Date: 2010-08-10 03:54:15
14Identity management / Computer access control / Federated identity / Electronic identification / Identification / Digital identity / Authentication / Eid / National Strategy for Trusted Identities in Cyberspace / Interoperability / Mobile identity management

Microsoft Word - SSEDIC Memorandum.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:06
15Privacy / Digital rights / Human rights / Identity management / Law / Information privacy / Internet privacy / Medical privacy / Privacy Commissioner / Privacy concerns with social networking services

Melbourne 31 October 2014 Privacy and mobile apps: more needs to be done The second annual Global Privacy Enforcement Network (GPEN) Privacy Sweep has found that as mobile apps increase in popularity, many of them are se

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-04-18 00:53:17
16Mobile technology / E-commerce / Marketing / Personalization / World Wide Web / Mobile search / Location-based service / Customer relationship management / Microsoft mobile services / Mobile phone / Ovi / Subscriber identity module

MAKE IT EASY FOR ME 3 WAYS OPERATORS CAN USE PERSONALIZATION TO GIVE CUSTOMERS WHAT THEY WANT ON THE MOBILE INTERNET A WHITE PAPER FROM XIAM TECHNOLOGIES LTD Disclaimer: Nothing in these materials is an offer to sell a

Add to Reading List

Source URL: www.ventajamarketing.com

Language: English - Date: 2010-01-08 20:42:34
17

DRAFT NISTIR 8080, Usability and Security Considerations for Public Safety Mobile Authentication, NISTIR 8080, usaability, Public Safety Mobile Authentication, authentication, identity management, local authentication, p

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-11-19 14:25:16
    18Smart cards / Subscriber identity module / Universal Integrated Circuit Card / UICC configuration / Removable User Identity Module / IP Multimedia Services Identity Module / Java Card / CDMA Subscriber Identity Module / SIM Application Toolkit / GSM / Short Message Service / Mobile device management

    simulity SIMULITY PRODUCTS & SERVICES OVERVIEW About Simulity

    Add to Reading List

    Source URL: www.simulity.com

    Language: English - Date: 2016-02-16 09:48:52
    19Security / Prevention / Computer access control / Identity documents / Access control / Cybercrime / Identity management / Password / Mobile security / Authentication / Transaction authentication number / Computer security

    Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, and Thorsten Holz Ruhr-University Bochum, Germany, {firstname.lastname}@rub.de

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:57
    20Computing / Technology / Network architecture / Mobile technology / Roaming / Network protocols / RADIUS / Eduroam / Mobile IP / GSM / IEEE 802.11u / UMTS

    CANSFederated Identity Management at CERNET Youjun Huang

    Add to Reading List

    Source URL: free.eol.cn

    Language: English - Date: 2015-09-28 11:34:49
    UPDATE