Search results

Search list

Results in:

1-10 of 24 results

Guidelines for the on boarding of user personal identification data within European Digital Identity Wallets

Guidelines for the onboarding of user personal identification data within European Digital Identity Wallets

IT Security and Privacy - A framework for identity management - Part 4: Authenticators, Credentials and Authentication

IT Security and Privacy - A framework for identity management - Part 3: Practice

IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts

Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 6: Mechanism for use of certification on trustworthiness of secure area

Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 4: Protocols and services for operational phase

Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 5: Trust models and confidence level assessment

Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 3: Protocols and services for issuing phase

Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 2: Data objects and encoding rules for generic eID systems

TOP