no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Building secure business applications at Microsoft
|
Steer, John |
|
2008 |
13 |
2 |
p. 105-110 |
article |
2 |
“Building secure business applications at Microsoft” by J. Steer and A. Popli
|
|
|
2008 |
13 |
2 |
p. 104 |
article |
3 |
Identity management of e-ID, privacy and security in Europe. A human rights view
|
De Hert, Paul |
|
2008 |
13 |
2 |
p. 71-75 |
article |
4 |
Identity management throughout one's whole life
|
Hansen, Marit |
|
2008 |
13 |
2 |
p. 83-94 |
article |
5 |
Insights on identity documents based on the Belgian case study
|
De Cock, Danny |
|
2008 |
13 |
2 |
p. 54-60 |
article |
6 |
Introduction to this issue
|
Ganley, Michael J. |
|
2008 |
13 |
2 |
p. 45 |
article |
7 |
Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution
|
Myhr, Thomas |
|
2008 |
13 |
2 |
p. 76-82 |
article |
8 |
National e-ID card schemes: A European overview
|
Arora, Siddhartha |
|
2008 |
13 |
2 |
p. 46-53 |
article |
9 |
Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID)
|
Collings, Tony |
|
2008 |
13 |
2 |
p. 61-70 |
article |
10 |
The benefits and drawbacks of using electronic identities
|
Price, Geraint |
|
2008 |
13 |
2 |
p. 95-103 |
article |