Mobile identity management

Results: 229



#Item
1Waking Project Privacy Impact Assessment Description: Waking Project To develop an alerting service with alerts pushed to secure mobile devices carried by suitably qualified clinicians. Questions to identify Privacy Issu

Waking Project Privacy Impact Assessment Description: Waking Project To develop an alerting service with alerts pushed to secure mobile devices carried by suitably qualified clinicians. Questions to identify Privacy Issu

Add to Reading List

Source URL: storage.googleapis.com

Language: English - Date: 2016-06-15 10:14:10
2PAD: Privacy-Area Aware, Dummy-Based Location Privacy in Mobile Services Hua Lu Christian S. Jensen Man Lung Yiu Department of Computer Science, Aalborg University, Denmark

PAD: Privacy-Area Aware, Dummy-Based Location Privacy in Mobile Services Hua Lu Christian S. Jensen Man Lung Yiu Department of Computer Science, Aalborg University, Denmark

Add to Reading List

Source URL: people.cs.aau.dk

Language: English - Date: 2008-06-04 07:04:54
3Therefore two different PINs (personal identification numbers) are needed: The Citizen Card Concept The Austrian Citizen Card is your Swiss Army knife for security in electronic communication with authorities

Therefore two different PINs (personal identification numbers) are needed: The Citizen Card Concept The Austrian Citizen Card is your Swiss Army knife for security in electronic communication with authorities

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2006-02-02 08:41:35
4Your Contact is Jason Blum (CEO)  +Neunbrunnenstrasse 33 | CH-8050 Zürich www.synacts.com www.digitalid.net

Your Contact is Jason Blum (CEO) +Neunbrunnenstrasse 33 | CH-8050 Zürich www.synacts.com www.digitalid.net

Add to Reading List

Source URL: www.synacts.com

Language: English - Date: 2016-08-02 05:40:35
5Harvesting Developer Credentials in Android Apps Yajin Zhou† , Lei Wu† , Zhi Wang‡ , Xuxian Jiang? † North Carolina State University

Harvesting Developer Credentials in Android Apps Yajin Zhou† , Lei Wu† , Zhi Wang‡ , Xuxian Jiang? † North Carolina State University

Add to Reading List

Source URL: yajin.org

Language: English - Date: 2016-06-04 10:52:06
6Microsoft Word - SSEDIC Outcomes Y3 WP6_3v1 6.docx

Microsoft Word - SSEDIC Outcomes Y3 WP6_3v1 6.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:04
7stethoscope on keyboard laptop

stethoscope on keyboard laptop

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2016-01-25 16:10:03
8Keyhub_Technical_Overview_28

Keyhub_Technical_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-13 04:56:07
9eSignatures in Austria Herbert Leitold Reykjavik; May 23rd, 2013 Zentrum für sichere Informationstechnologie - Austria

eSignatures in Austria Herbert Leitold Reykjavik; May 23rd, 2013 Zentrum für sichere Informationstechnologie - Austria

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2013-05-23 09:32:41
10Keyhub_Product_Overview_28

Keyhub_Product_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-10 04:15:28