Emerging Technologies for Authorization and Authentication: First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings

Author:   Andrea Saracino ,  Paolo Mori
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2018
Volume:   11263
ISBN:  

9783030043711


Pages:   129
Publication Date:   24 November 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Emerging Technologies for Authorization and Authentication: First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018. The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures. 

Full Product Details

Author:   Andrea Saracino ,  Paolo Mori
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2018
Volume:   11263
Weight:   0.454kg
ISBN:  

9783030043711


ISBN 10:   3030043711
Pages:   129
Publication Date:   24 November 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Authentication and authorization techniques.- Authentication and authorization for interoperable IoT architecture.- Bringing Access Control Tree to Big Data.- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme.- A Protocol to Strengthen Password-Based Authentication(short paper).- Managing Private Credentials by Privacy-Preserving Biometrics.- Policy Support for Autonomous Swarms of Drones.- Violation Detection and Countermeasures.- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts.- Towards a Framework for Testing the Security of IoT Devices Consistently.- Misuse Detection in a Simulated IaaS Environment.- Dissuading Stolen Password Reuse.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List