000 05014cam a2200841 i 4500
001 on1228649011
003 OCoLC
005 20250707093628.0
006 m o d
007 cr nn||||mamaa
008 201203s2020 sz a o 101 0 eng d
040 _aSFB
_beng
_erda
_epn
_cSFB
_dOCLCO
_dOCLCF
_dGW5XE
_dOCLCO
_dYDX
_dUKBTH
_dUPM
_dBDX
_dEBLCP
_dOCL
_dOCLCO
_dOCLCQ
_dOCLCO
_dCOM
_dOCLCO
_dOCLCQ
_dOCLCO
019 _a1225947077
_a1226594687
_a1228844584
_a1233063667
_a1241727379
020 _a9783030644550
_q(electronic book)
020 _a3030644553
_q(electronic book)
020 _z3030644545
020 _z9783030644543
024 7 _a10.1007/978-3-030-64455-0
_2doi
029 1 _aAU@
_b000068486880
029 1 _aAU@
_b000068657036
035 _a(OCoLC)1228649011
_z(OCoLC)1225947077
_z(OCoLC)1226594687
_z(OCoLC)1228844584
_z(OCoLC)1233063667
_z(OCoLC)1241727379
050 4 _aQA76.9.A25
072 7 _aUY
_2bicssc
072 7 _aCOM014000
_2bisacsh
072 7 _aUY
_2thema
082 0 4 _a005.8/3
_223
049 _aMAIN
111 2 _aETAA (Workshop)
_n(3rd :
_d2020 :
_cOnline)
_9914891
245 1 0 _aEmerging Technologies for Authorization and Authentication :
_bThird International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings /
_cAndrea Saracino, Paolo Mori (eds.).
246 3 _aETAA 2020
264 1 _aCham, Switzerland :
_bSpringer,
_c[2020]
300 _a1 online resource (vii, 169 pages) :
_billustrations (some color)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
347 _bPDF
490 1 _aLecture notes in computer science ;
_v12515
490 1 _aLNCS sublibrary: SL4 - Security and cryptology
500 _aInternational conference proceedings.
520 _aThis book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020 co-located with the 24th European Symposium on Research in Computer Security (ESORICS 2020). The 10 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The conference was planned at University of Surrey, Guildford, UK. Due to COVID-19 outbreak, ESORICS conference and affiliated workshop will be held online. The workshop presents new techniques for biometric and behavioral based authentication, and authorization in the IoT and in distributed systems in general, and much more.
505 0 _aDeep Learning based Sequential Mining for User Authentication in Web Applications -- An Interoperable Architecture for Usable Password-Less Authentication -- auth.js: Advanced Authentication for the Web -- Automated and Secure Integration of the OpenID Connect iGov Pro le in Mobile Native Applications -- Micro-Id-Gym: a Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory -- IFTTT Privacy Checker -- A Comparison Among Policy Editors for Attributed Based Access Control Model -- Automatic rewalls con guration using argumentation reasoning -- On Results of Data Aggregation Operations -- The cost of having been pwned: a security service provider's perspect.
500 _aIncludes author index.
588 0 _aOnline resource; title from PDF title page (SpringerLink, viewed February 12, 2021).
650 0 _aComputer security
_vCongresses.
_914968
650 0 _aComputer networks
_xAccess control
_vCongresses.
_920423
650 0 _aData protection
_vCongresses.
_915989
650 6 _aSécurité informatique
_vCongrès.
_917411
650 6 _aProtection de l'information (Informatique)
_vCongrès.
_917410
650 7 _aData protection
_2fast
_915990
650 7 _aComputer networks
_xAccess control
_2fast
_920428
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer organization
_2fast
_97616
650 7 _aComputer science
_2fast
_9941
650 7 _aComputer security
_2fast
_92191
650 7 _aComputers
_2fast
_91420
655 2 _aCongress
_911670
655 7 _aproceedings (reports)
_2aat
655 7 _aConference papers and proceedings
_2fast
_96065
655 7 _aConference papers and proceedings.
_2lcgft
_96065
655 7 _aActes de congrès.
_2rvmgf
_9609890
700 1 _aSaracino, Andrea,
_eeditor
_1https://orcid.org/0000-0001-8149-9322
_967691
700 1 _aMori, Paolo
_c(Computer scientist),
_eeditor
_1https://orcid.org/0000-0002-6618-0388
_967692
711 2 _aEuropean Symposium on Research in Computer Security
_n(25th :
_d2020 :
_cOnline)
_9914353
776 0 8 _iPrint version:
_z9783030644543
830 0 _aLecture notes in computer science ;
_v12515.
830 0 _aLNCS sublibrary.
_nSL 4,
_pSecurity and cryptology.
_920708
856 4 0 _uhttps://link.springer.com/10.1007/978-3-030-64455-0
938 _aBrodart
_bBROD
_n128292644
938 _aProQuest Ebook Central
_bEBLB
_nEBL6420678
938 _aYBP Library Services
_bYANK
_n301790059
994 _a92
_bATIST
999 _c648499
_d648499