Authentication, Identification and Trusted Third Parties


Abstract This article has no associated abstract. (fix it)
Keywords No keywords specified (fix it)
Categories No categories specified
(categorize this paper)
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

Our Archive


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 43,865
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

No references found.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

Biometrics: Body Odor Authentication Perception and Acceptance.Martin D. Gibbs - 2010 - Acm Sigcas Computers and Society 40 (4):16-24.
A New E-ID Card and Online Authentication in Spain.Alexander Heichlinger & Patricia Gallego - 2010 - Identity in the Information Society 3 (1):43-64.
Identification with Nature: What It is and Why It Matters.Christian Diehm - 2007 - Ethics and the Environment 12 (2):1-22.
Identifying with Our Desires.Christian Miller - 2013 - Theoria 79 (2):127-154.
Psychological Identification, Imagination and Psychoanalysis.Louise Braddock - 2011 - Philosophical Psychology 24 (5):639 - 657.

Analytics

Added to PP index
2013-12-25

Total views
0

Recent downloads (6 months)
0

How can I increase my downloads?

Downloads

Sorry, there are not enough data points to plot this chart.

My notes

Sign in to use this feature