UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

2 3 4 5 6
zadetkov: 569
31.
  • FogAuthChain: A secure loca... FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
    Patwary, Abdullah Al-Noman; Fu, Anmin; Battula, Sudheer Kumar ... Computer communications, 10/2020, Letnik: 162
    Journal Article
    Recenzirano

    Fog computing is an emerging computing paradigm which expands cloud-based computing services near the network edge. With this new computing paradigm, new challenges arise in terms of security and ...
Celotno besedilo
32.
  • Ontology Extraction of Digi... Ontology Extraction of Digital Identity based on Domain Analysis
    Javad Taghizadeh Naeeni; Fatima Fahimnia; Nader Naghshineh Pizhūhishnāmah-i pardāzish va mudiriyyat-i iṭṭilāʻāt (Online), 09/2019, Letnik: 34, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Digital identity has become a significant paradigm in variety of fields such as, sociology, psychology, social studies, information science and software engineering. Digital identity, as an ...
Celotno besedilo
33.
  • Der grundrechtliche Schutz ... Der grundrechtliche Schutz der digitalen Identität unter Berücksichtigung von Datenschutz- und IT-Sicherheitsrecht
    Vettermann, Oliver 2022, Letnik: 19
    eBook
    Odprti dostop

    The digital identity is the essential human data interface when interacting on the Internet or with IT systems to enable the multitude of services. No platform can be used without creating a (at ...
Celotno besedilo
34.
  • Best current practices for ... Best current practices for OAuth/OIDC Native Apps
    Sharif, Amir; Carbone, Roberto; Sciarretta, Giada ... Journal of information security and applications, March 2022, 2022-03-00, Letnik: 65
    Journal Article
    Recenzirano

    OAuth 2.0 and OpenID Connect have been extensively integrated into mobile applications during recent years to manage access delegation and reduce password fatigue via a single sign-on experience. To ...
Celotno besedilo
35.
  • She’s so vain? A Q study of... She’s so vain? A Q study of selfies and the curation of an online self
    Lazard, Lisa; Capdevila, Rose New media & society, 06/2021, Letnik: 23, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Selfie posting is now a well-established practice, particularly for young women. However, it is nevertheless much maligned in popular discourses. As a counterpoint to digital narcissism, selfie ...
Celotno besedilo

PDF
36.
  • The metaverse matrix of labour law
    Magdalena Nogueira Guastavino; David Mangan Italian labour law e-journal, 07/2023, Letnik: 16, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The rise of the idea of a metaverse in which the real world is replicated has implications for industrial relations. Some of the most important cross-cutting issues are raised in this study in order ...
Celotno besedilo
37.
  • Digital Identities and Veri... Digital Identities and Verifiable Credentials
    Sedlmeir, Johannes; Smethurst, Reilly; Rieger, Alexander ... Business & information systems engineering, 10/2021, Letnik: 63, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop
Celotno besedilo

PDF
38.
  • L’identità digitale nel metaverso
    Michele Iaselli Democrazia e diritti sociali, 06/2023, Letnik: 2023, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The essay analyses and explores the concept of personal identity in the light not only of the already tested digital dimension but also of a further evolution of the Internet represented by the ...
Celotno besedilo
39.
  • Proposing a digital identit... Proposing a digital identity management framework: A mixed‐method approach
    Rasouli, Hatef; Valmohammadi, Changiz; Azad, Naser ... Concurrency and computation, 10 September 2021, Letnik: 33, Številka: 17
    Journal Article
    Recenzirano

    This research aims to study the most critical elements of digital identity management to recognize the pattern and the requirements of their use and implementation. Further, an attempt is made to ...
Celotno besedilo
40.
Celotno besedilo
2 3 4 5 6
zadetkov: 569

Nalaganje filtrov