Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,084,873 papers from all fields of science
Search
Sign In
Create Free Account
Digital identity
Known as:
Digital ID
, Digital Identity System
, Identity
A digital identity is information on an entity used by computer systems to represent an external agent. That agent may be a person, organisation…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
Authentication
Biometrics
Blogosphere
Closed-loop authentication
Expand
Broader (3)
Computer access control
Federated identity
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
One Out of Many? Boundary Negotiation and Identity Formation in Postmerger Integration
I. Drori
,
Amy Wrzesniewski
,
Shmuel Ellis
Organ. Sci.
2013
Corpus ID: 13285500
This research investigates how boundaries are utilized during the postmerger integration process to influence the postmerger…
Expand
2009
2009
A Security Meta-model for Service-Oriented Architectures
Michael Menzel
,
C. Meinel
IEEE International Conference on Services…
2009
Corpus ID: 15197715
Services account for a major part of the IT industry today. Companies increasingly like to focus on their core expertise area and…
Expand
2009
2009
Privacy, Free Speech, and 'Blurry-Edged' Social Networks
Lauren Gelman
2009
Corpus ID: 154698618
Much of Internet-related scholarship over the past ten years has focused on the enormous benefits that come from eliminating…
Expand
2007
2007
Indigenous values informing curriculum and pedagogical praxis
Shayne Williams
2007
Corpus ID: 154778936
This thesis explores the cultural difference between the value systems of Indigenous and non-Indigenous Australia, and considers…
Expand
Highly Cited
2006
Highly Cited
2006
Robust, short and sensitive authentication tags using secure sketch
Qiming Li
,
E. Chang
Workshop on Multimedia & Security
2006
Corpus ID: 6380103
In order to apply cryptographic operations on noisy data, a recent approach employs some additional public data, known as secure…
Expand
2006
2006
Making sense of multiple literacies: Exploring pre‐service content area teachers' understandings and applications
Heather K. Sheridan‐Thomas
2006
Corpus ID: 144441030
Abstract Over the past decade, numerous literacy researchers have investigated the multiple literacies of adolescents. Connecting…
Expand
Highly Cited
2006
Highly Cited
2006
Mass Incarceration and the Proliferation of Criminal Records
J. Jacobs
2006
Corpus ID: 153404674
Highly Cited
2004
Highly Cited
2004
Wireless Future: Ubiquitous Computing
Friedemann Mattern
2004
Corpus ID: 10024700
Over the last 30 years, we have seen the power of microprocessors double about every 18 months. An equally rapid increase applies…
Expand
1996
1996
Fashioning the Nation: Costume and Identity in British Cinema
Pam Cook
1996
Corpus ID: 190354876
This work explores the history of costume in British film, from the 1920s to the 1990s. It shows how period costume romances…
Expand
1989
1989
Paradox, Identity and Change in Management
B. Nooteboom
1989
Corpus ID: 143224604
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE