000 | 03618nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-030-04372-8 | ||
003 | DE-He213 | ||
005 | 20240730171709.0 | ||
007 | cr nn 008mamaa | ||
008 | 181123s2018 sz | s |||| 0|eng d | ||
020 |
_a9783030043728 _9978-3-030-04372-8 |
||
024 | 7 |
_a10.1007/978-3-030-04372-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aEmerging Technologies for Authorization and Authentication _h[electronic resource] : _bFirst International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings / _cedited by Andrea Saracino, Paolo Mori. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aIX, 129 p. 39 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11263 |
|
505 | 0 | _aAuthentication and authorization techniques -- Authentication and authorization for interoperable IoT architecture -- Bringing Access Control Tree to Big Data -- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme -- A Protocol to Strengthen Password-Based Authentication(short paper) -- Managing Private Credentials by Privacy-Preserving Biometrics -- Policy Support for Autonomous Swarms of Drones -- Violation Detection and Countermeasures -- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts -- Towards a Framework for Testing the Security of IoT Devices Consistently -- Misuse Detection in a Simulated IaaS Environment -- Dissuading Stolen Password Reuse. | |
520 | _aThis book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018. The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures. . | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aApplication software. _999995 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aBiometric identification. _911407 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _999998 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
650 | 2 | 4 |
_aComputer Communication Networks. _9100000 |
650 | 2 | 4 |
_aBiometrics. _932763 |
700 | 1 |
_aSaracino, Andrea. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100002 |
|
700 | 1 |
_aMori, Paolo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100003 |
|
710 | 2 |
_aSpringerLink (Online service) _9100005 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030043711 |
776 | 0 | 8 |
_iPrinted edition: _z9783030043735 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11263 _9100006 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-04372-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c87758 _d87758 |