nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Building secure business applications at Microsoft
|
Steer, John |
|
2008 |
13 |
2 |
p. 105-110 |
artikel |
2 |
“Building secure business applications at Microsoft” by J. Steer and A. Popli
|
|
|
2008 |
13 |
2 |
p. 104 |
artikel |
3 |
Identity management of e-ID, privacy and security in Europe. A human rights view
|
De Hert, Paul |
|
2008 |
13 |
2 |
p. 71-75 |
artikel |
4 |
Identity management throughout one's whole life
|
Hansen, Marit |
|
2008 |
13 |
2 |
p. 83-94 |
artikel |
5 |
Insights on identity documents based on the Belgian case study
|
De Cock, Danny |
|
2008 |
13 |
2 |
p. 54-60 |
artikel |
6 |
Introduction to this issue
|
Ganley, Michael J. |
|
2008 |
13 |
2 |
p. 45 |
artikel |
7 |
Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution
|
Myhr, Thomas |
|
2008 |
13 |
2 |
p. 76-82 |
artikel |
8 |
National e-ID card schemes: A European overview
|
Arora, Siddhartha |
|
2008 |
13 |
2 |
p. 46-53 |
artikel |
9 |
Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID)
|
Collings, Tony |
|
2008 |
13 |
2 |
p. 61-70 |
artikel |
10 |
The benefits and drawbacks of using electronic identities
|
Price, Geraint |
|
2008 |
13 |
2 |
p. 95-103 |
artikel |