語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Emerging technologies for authorizat...
~
Workshop on the Preservation of Stability under Discretization ((2001 :)
Emerging technologies for authorization and authentication = first International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018 : proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Emerging technologies for authorization and authentication/ edited by Andrea Saracino, Paolo Mori.
其他題名:
first International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018 : proceedings /
其他題名:
ETAA 2018
其他作者:
Saracino, Andrea.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Cham :Springer International Publishing : : 2018.,
面頁冊數:
ix, 129 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer eBooks
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-030-04372-8
ISBN:
9783030043728
Emerging technologies for authorization and authentication = first International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018 : proceedings /
Emerging technologies for authorization and authentication
first International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018 : proceedings /[electronic resource] :ETAA 2018edited by Andrea Saracino, Paolo Mori. - Cham :Springer International Publishing :2018. - ix, 129 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,112630302-9743 ;. - Lecture notes in computer science ;6140..
Authentication and authorization techniques -- Authentication and authorization for interoperable IoT architecture -- Bringing Access Control Tree to Big Data -- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme -- A Protocol to Strengthen Password-Based Authentication(short paper) -- Managing Private Credentials by Privacy-Preserving Biometrics -- Policy Support for Autonomous Swarms of Drones -- Violation Detection and Countermeasures -- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts -- Towards a Framework for Testing the Security of IoT Devices Consistently -- Misuse Detection in a Simulated IaaS Environment -- Dissuading Stolen Password Reuse.
This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018. The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures.
ISBN: 9783030043728
Standard No.: 10.1007/978-3-030-04372-8doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Emerging technologies for authorization and authentication = first International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018 : proceedings /
LDR
:02365nam a2200361 a 4500
001
930124
003
DE-He213
005
20181123042647.0
006
m d
007
cr nn 008maaau
008
190627s2018 gw s 0 eng d
020
$a
9783030043728
$q
(electronic bk.)
020
$a
9783030043711
$q
(paper)
024
7
$a
10.1007/978-3-030-04372-8
$2
doi
035
$a
978-3-030-04372-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2018
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Emerging technologies for authorization and authentication
$h
[electronic resource] :
$b
first International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018 : proceedings /
$c
edited by Andrea Saracino, Paolo Mori.
246
3
$a
ETAA 2018
260
$a
Cham :
$c
2018.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
ix, 129 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11263
490
1
$a
Security and cryptology
505
0
$a
Authentication and authorization techniques -- Authentication and authorization for interoperable IoT architecture -- Bringing Access Control Tree to Big Data -- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme -- A Protocol to Strengthen Password-Based Authentication(short paper) -- Managing Private Credentials by Privacy-Preserving Biometrics -- Policy Support for Autonomous Swarms of Drones -- Violation Detection and Countermeasures -- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts -- Towards a Framework for Testing the Security of IoT Devices Consistently -- Misuse Detection in a Simulated IaaS Environment -- Dissuading Stolen Password Reuse.
520
$a
This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018. The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Computer networks
$x
Access control
$v
Congresses.
$3
770750
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
669780
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
815116
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Biometrics.
$3
677095
700
1
$a
Saracino, Andrea.
$3
1211097
700
1
$a
Mori, Paolo.
$3
1205898
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
6140.
$3
744199
830
0
$a
Security and cryptology.
$3
1208317
856
4 0
$u
https://doi.org/10.1007/978-3-030-04372-8
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入