語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Emerging technologies for authorizat...
~
ETAA (Workshop) (2020 :)
FindBook
Google Book
Amazon
博客來
Emerging technologies for authorization and authentication = third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Emerging technologies for authorization and authentication/ edited by Andrea Saracino, Paolo Mori.
其他題名:
third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020 : proceedings /
其他題名:
ETAA 2020
其他作者:
Saracino, Andrea.
團體作者:
ETAA (Workshop)
出版者:
Cham :Springer International Publishing : : 2020.,
面頁冊數:
vii, 169 p. :ill. (some col.), digital ;24 cm.
內容註:
Deep Learning based Sequential Mining for User Authentication in Web Applications -- An Interoperable Architecture for Usable Password-Less Authentication -- auth.js: Advanced Authentication for the Web -- Automated and Secure Integration of the OpenID Connect iGov Pro le in Mobile Native Applications -- Micro-Id-Gym: a Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory -- IFTTT Privacy Checker -- A Comparison Among Policy Editors for Attributed Based Access Control Model -- Automatic rewalls con guration using argumentation reasoning -- On Results of Data Aggregation Operations -- The cost of having been pwned: a security service provider's perspect.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-030-64455-0
ISBN:
9783030644550
Emerging technologies for authorization and authentication = third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020 : proceedings /
Emerging technologies for authorization and authentication
third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020 : proceedings /[electronic resource] :ETAA 2020edited by Andrea Saracino, Paolo Mori. - Cham :Springer International Publishing :2020. - vii, 169 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,125150302-9743 ;. - Lecture notes in computer science ;12515..
Deep Learning based Sequential Mining for User Authentication in Web Applications -- An Interoperable Architecture for Usable Password-Less Authentication -- auth.js: Advanced Authentication for the Web -- Automated and Secure Integration of the OpenID Connect iGov Pro le in Mobile Native Applications -- Micro-Id-Gym: a Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory -- IFTTT Privacy Checker -- A Comparison Among Policy Editors for Attributed Based Access Control Model -- Automatic rewalls con guration using argumentation reasoning -- On Results of Data Aggregation Operations -- The cost of having been pwned: a security service provider's perspect.
This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020. The 10 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The conference was planned at University of Surrey, Guildford, UK. Due to COVID-19 outbreak, ESORICS conference and affiliated workshop will be held online. The workshop presents new techniques for biometric and behavioral based authentication, and authorization in the IoT and in distributed systems in general, and much more.
ISBN: 9783030644550
Standard No.: 10.1007/978-3-030-64455-0doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.83
Emerging technologies for authorization and authentication = third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020 : proceedings /
LDR
:02549nmm a2200361 a 4500
001
2257494
003
DE-He213
005
20201203064426.0
006
m d
007
cr nn 008maaau
008
220420s2020 sz s 0 eng d
020
$a
9783030644550
$q
(electronic bk.)
020
$a
9783030644543
$q
(paper)
024
7
$a
10.1007/978-3-030-64455-0
$2
doi
035
$a
978-3-030-64455-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UY
$2
bicssc
072
7
$a
COM014000
$2
bisacsh
072
7
$a
UY
$2
thema
082
0 4
$a
005.83
$2
23
090
$a
QA76.9.A25
$b
E83 2020
111
2
$a
ETAA (Workshop)
$n
(3rd :
$d
2020 :
$c
Online)
$3
3528680
245
1 0
$a
Emerging technologies for authorization and authentication
$h
[electronic resource] :
$b
third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020 : proceedings /
$c
edited by Andrea Saracino, Paolo Mori.
246
3
$a
ETAA 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
vii, 169 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12515
490
1
$a
Security and cryptology
505
0
$a
Deep Learning based Sequential Mining for User Authentication in Web Applications -- An Interoperable Architecture for Usable Password-Less Authentication -- auth.js: Advanced Authentication for the Web -- Automated and Secure Integration of the OpenID Connect iGov Pro le in Mobile Native Applications -- Micro-Id-Gym: a Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory -- IFTTT Privacy Checker -- A Comparison Among Policy Editors for Attributed Based Access Control Model -- Automatic rewalls con guration using argumentation reasoning -- On Results of Data Aggregation Operations -- The cost of having been pwned: a security service provider's perspect.
520
$a
This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020. The 10 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The conference was planned at University of Surrey, Guildford, UK. Due to COVID-19 outbreak, ESORICS conference and affiliated workshop will be held online. The workshop presents new techniques for biometric and behavioral based authentication, and authorization in the IoT and in distributed systems in general, and much more.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computer networks
$x
Access control
$v
Congresses.
$3
892855
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
1 4
$a
Computer Science, general.
$3
892601
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
891212
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Security Services.
$3
3382346
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Saracino, Andrea.
$3
3447167
700
1
$a
Mori, Paolo.
$3
3221341
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
12515.
$3
3528681
830
0
$a
Security and cryptology.
$3
3382517
856
4 0
$u
https://doi.org/10.1007/978-3-030-64455-0
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9413124
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入