|
|
|
|
LEADER |
03909nam a2200589 4500 |
001 |
978-3-030-04372-8 |
003 |
DE-He213 |
005 |
20191217031515.0 |
007 |
cr nn 008mamaa |
008 |
181123s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030043728
|9 978-3-030-04372-8
|
024 |
7 |
|
|a 10.1007/978-3-030-04372-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Emerging Technologies for Authorization and Authentication
|h [electronic resource] :
|b First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings /
|c edited by Andrea Saracino, Paolo Mori.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a IX, 129 p. 39 illus., 29 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11263
|
505 |
0 |
|
|a Authentication and authorization techniques -- Authentication and authorization for interoperable IoT architecture -- Bringing Access Control Tree to Big Data -- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme -- A Protocol to Strengthen Password-Based Authentication(short paper) -- Managing Private Credentials by Privacy-Preserving Biometrics -- Policy Support for Autonomous Swarms of Drones -- Violation Detection and Countermeasures -- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts -- Towards a Framework for Testing the Security of IoT Devices Consistently -- Misuse Detection in a Simulated IaaS Environment -- Dissuading Stolen Password Reuse.
|
520 |
|
|
|a This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018. The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures. .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
1 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 http://scigraph.springernature.com/things/product-market-codes/I18040
|
650 |
2 |
4 |
|a Computing Milieux.
|0 http://scigraph.springernature.com/things/product-market-codes/I24008
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Biometrics.
|0 http://scigraph.springernature.com/things/product-market-codes/I22040
|
700 |
1 |
|
|a Saracino, Andrea.
|e editor.
|0 (orcid)0000-0001-8149-9322
|1 https://orcid.org/0000-0001-8149-9322
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Mori, Paolo.
|e editor.
|0 (orcid)0000-0002-6618-0388
|1 https://orcid.org/0000-0002-6618-0388
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030043711
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030043735
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11263
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-04372-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|