National identities

Results: 332



#Item
41Response by Kaliya Hamlin, Identity Woman User-Advocate / Independent Expert / Identity Community Leader To [Docket No02] Notice of Inquiry Models for a Governance Structure for the National Strategy for

Response by Kaliya Hamlin, Identity Woman User-Advocate / Independent Expert / Identity Community Leader To [Docket No02] Notice of Inquiry Models for a Governance Structure for the National Strategy for

Add to Reading List

Source URL: www.identitywoman.net

Language: English - Date: 2007-09-05 22:15:00
42Musical Instruments and Material Culture ABSTRACTS Dambora: The embodiments of sufferings, resistance and identities for Hazaras of Afghanistan Khadija Abbasi, The Graduate Institute, Geneva The paper attempts to cast li

Musical Instruments and Material Culture ABSTRACTS Dambora: The embodiments of sufferings, resistance and identities for Hazaras of Afghanistan Khadija Abbasi, The Graduate Institute, Geneva The paper attempts to cast li

Add to Reading List

Source URL: www.horniman.ac.uk

Language: English - Date: 2015-03-25 12:12:29
43Remarks of Catherine Tilton at the Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC)

Remarks of Catherine Tilton at the Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC)

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-08-27 17:43:54
44Cybersecurity: Authoritative Reports and Resources, by Topic

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-04-01 12:55:47
45Web of Trust To the Trusted Third Party:The Thawte Web of Trust is a global attempt to assure Internet user identities through personal verification of national identity documents. The Applicant asks you to certify to Th

Web of Trust To the Trusted Third Party:The Thawte Web of Trust is a global attempt to assure Internet user identities through personal verification of national identity documents. The Applicant asks you to certify to Th

Add to Reading List

Source URL: www.barut.info

Language: English - Date: 2005-06-18 16:49:36
46CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:11
47HEARING BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY February 11, 2015 Countering Violent Islamist Extremism: The Urgent Threat of Foreign Fighters and

HEARING BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY February 11, 2015 Countering Violent Islamist Extremism: The Urgent Threat of Foreign Fighters and

Add to Reading List

Source URL: www.nctc.gov

Language: English - Date: 2015-03-11 16:24:24
48CTO Corner September 2012 Striking a Balance between Privacy and Security Transformation Dan Schutzer, CTO, BITS

CTO Corner September 2012 Striking a Balance between Privacy and Security Transformation Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:20
49Cloud-Based Identity Services  TrustX Technologies, Inc[removed]	
  Random	
  Hills	
  Rd.,	
  Suite	
  650	
   Fairfax,	
  VA	
  	
  22030

Cloud-Based Identity Services TrustX Technologies, Inc[removed]  Random  Hills  Rd.,  Suite  650   Fairfax,  VA    22030

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-08-27 17:43:58
50February 11, 2015 ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY (FFO) National Strategy for Trusted Identities in Cyberspace (NSTIC) Pilots Cooperative Agreement Program EXECUTIVE SUMMARY •

February 11, 2015 ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY (FFO) National Strategy for Trusted Identities in Cyberspace (NSTIC) Pilots Cooperative Agreement Program EXECUTIVE SUMMARY •

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-02-12 09:55:48