| 000 | 05014cam a2200841 i 4500 | ||
|---|---|---|---|
| 001 | on1228649011 | ||
| 003 | OCoLC | ||
| 005 | 20250707093628.0 | ||
| 006 | m o d | ||
| 007 | cr nn||||mamaa | ||
| 008 | 201203s2020 sz a o 101 0 eng d | ||
| 040 |
_aSFB _beng _erda _epn _cSFB _dOCLCO _dOCLCF _dGW5XE _dOCLCO _dYDX _dUKBTH _dUPM _dBDX _dEBLCP _dOCL _dOCLCO _dOCLCQ _dOCLCO _dCOM _dOCLCO _dOCLCQ _dOCLCO |
||
| 019 |
_a1225947077 _a1226594687 _a1228844584 _a1233063667 _a1241727379 |
||
| 020 |
_a9783030644550 _q(electronic book) |
||
| 020 |
_a3030644553 _q(electronic book) |
||
| 020 | _z3030644545 | ||
| 020 | _z9783030644543 | ||
| 024 | 7 |
_a10.1007/978-3-030-64455-0 _2doi |
|
| 029 | 1 |
_aAU@ _b000068486880 |
|
| 029 | 1 |
_aAU@ _b000068657036 |
|
| 035 |
_a(OCoLC)1228649011 _z(OCoLC)1225947077 _z(OCoLC)1226594687 _z(OCoLC)1228844584 _z(OCoLC)1233063667 _z(OCoLC)1241727379 |
||
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aUY _2bicssc |
|
| 072 | 7 |
_aCOM014000 _2bisacsh |
|
| 072 | 7 |
_aUY _2thema |
|
| 082 | 0 | 4 |
_a005.8/3 _223 |
| 049 | _aMAIN | ||
| 111 | 2 |
_aETAA (Workshop) _n(3rd : _d2020 : _cOnline) _9914891 |
|
| 245 | 1 | 0 |
_aEmerging Technologies for Authorization and Authentication : _bThird International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings / _cAndrea Saracino, Paolo Mori (eds.). |
| 246 | 3 | _aETAA 2020 | |
| 264 | 1 |
_aCham, Switzerland : _bSpringer, _c[2020] |
|
| 300 |
_a1 online resource (vii, 169 pages) : _billustrations (some color) |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 | _atext file | ||
| 347 | _bPDF | ||
| 490 | 1 |
_aLecture notes in computer science ; _v12515 |
|
| 490 | 1 | _aLNCS sublibrary: SL4 - Security and cryptology | |
| 500 | _aInternational conference proceedings. | ||
| 520 | _aThis book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020 co-located with the 24th European Symposium on Research in Computer Security (ESORICS 2020). The 10 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The conference was planned at University of Surrey, Guildford, UK. Due to COVID-19 outbreak, ESORICS conference and affiliated workshop will be held online. The workshop presents new techniques for biometric and behavioral based authentication, and authorization in the IoT and in distributed systems in general, and much more. | ||
| 505 | 0 | _aDeep Learning based Sequential Mining for User Authentication in Web Applications -- An Interoperable Architecture for Usable Password-Less Authentication -- auth.js: Advanced Authentication for the Web -- Automated and Secure Integration of the OpenID Connect iGov Pro le in Mobile Native Applications -- Micro-Id-Gym: a Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory -- IFTTT Privacy Checker -- A Comparison Among Policy Editors for Attributed Based Access Control Model -- Automatic rewalls con guration using argumentation reasoning -- On Results of Data Aggregation Operations -- The cost of having been pwned: a security service provider's perspect. | |
| 500 | _aIncludes author index. | ||
| 588 | 0 | _aOnline resource; title from PDF title page (SpringerLink, viewed February 12, 2021). | |
| 650 | 0 |
_aComputer security _vCongresses. _914968 |
|
| 650 | 0 |
_aComputer networks _xAccess control _vCongresses. _920423 |
|
| 650 | 0 |
_aData protection _vCongresses. _915989 |
|
| 650 | 6 |
_aSécurité informatique _vCongrès. _917411 |
|
| 650 | 6 |
_aProtection de l'information (Informatique) _vCongrès. _917410 |
|
| 650 | 7 |
_aData protection _2fast _915990 |
|
| 650 | 7 |
_aComputer networks _xAccess control _2fast _920428 |
|
| 650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
| 650 | 7 |
_aComputer organization _2fast _97616 |
|
| 650 | 7 |
_aComputer science _2fast _9941 |
|
| 650 | 7 |
_aComputer security _2fast _92191 |
|
| 650 | 7 |
_aComputers _2fast _91420 |
|
| 655 | 2 |
_aCongress _911670 |
|
| 655 | 7 |
_aproceedings (reports) _2aat |
|
| 655 | 7 |
_aConference papers and proceedings _2fast _96065 |
|
| 655 | 7 |
_aConference papers and proceedings. _2lcgft _96065 |
|
| 655 | 7 |
_aActes de congrès. _2rvmgf _9609890 |
|
| 700 | 1 |
_aSaracino, Andrea, _eeditor _1https://orcid.org/0000-0001-8149-9322 _967691 |
|
| 700 | 1 |
_aMori, Paolo _c(Computer scientist), _eeditor _1https://orcid.org/0000-0002-6618-0388 _967692 |
|
| 711 | 2 |
_aEuropean Symposium on Research in Computer Security _n(25th : _d2020 : _cOnline) _9914353 |
|
| 776 | 0 | 8 |
_iPrint version: _z9783030644543 |
| 830 | 0 |
_aLecture notes in computer science ; _v12515. |
|
| 830 | 0 |
_aLNCS sublibrary. _nSL 4, _pSecurity and cryptology. _920708 |
|
| 856 | 4 | 0 | _uhttps://link.springer.com/10.1007/978-3-030-64455-0 |
| 938 |
_aBrodart _bBROD _n128292644 |
||
| 938 |
_aProQuest Ebook Central _bEBLB _nEBL6420678 |
||
| 938 |
_aYBP Library Services _bYANK _n301790059 |
||
| 994 |
_a92 _bATIST |
||
| 999 |
_c648499 _d648499 |
||