000 | 03621nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-030-64455-0 | ||
003 | DE-He213 | ||
005 | 20240423125331.0 | ||
007 | cr nn 008mamaa | ||
008 | 201203s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030644550 _9978-3-030-64455-0 |
||
024 | 7 |
_a10.1007/978-3-030-64455-0 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUY _2bicssc |
|
072 | 7 |
_aCOM000000 _2bisacsh |
|
072 | 7 |
_aUY _2thema |
|
082 | 0 | 4 |
_a004 _223 |
245 | 1 | 0 |
_aEmerging Technologies for Authorization and Authentication _h[electronic resource] : _bThird International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings / _cedited by Andrea Saracino, Paolo Mori. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aVII, 169 p. 47 illus., 31 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12515 |
|
505 | 0 | _aDeep Learning based Sequential Mining for User Authentication in Web Applications -- An Interoperable Architecture for Usable Password-Less Authentication -- auth.js: Advanced Authentication for the Web -- Automated and Secure Integration of the OpenID Connect iGov Pro le in Mobile Native Applications -- Micro-Id-Gym: a Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory -- IFTTT Privacy Checker -- A Comparison Among Policy Editors for Attributed Based Access Control Model -- Automatic rewalls con guration using argumentation reasoning -- On Results of Data Aggregation Operations -- The cost of having been pwned: a security service provider's perspect. | |
520 | _aThis book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020. The 10 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The conference was planned at University of Surrey, Guildford, UK. Due to COVID-19 outbreak, ESORICS conference and affiliated workshop will be held online. The workshop presents new techniques for biometric and behavioral based authentication, and authorization in the IoT and in distributed systems in general, and much more. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aData protection. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aComputers. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aComputing Milieux. |
650 | 2 | 4 | _aSecurity Services. |
650 | 2 | 4 | _aMobile and Network Security. |
700 | 1 |
_aSaracino, Andrea. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMori, Paolo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030644543 |
776 | 0 | 8 |
_iPrinted edition: _z9783030644567 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12515 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-64455-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c176812 _d176812 |