Cantitate/Preț
Produs

Emerging Technologies for Authorization and Authentication: Lecture Notes in Computer Science, cartea 12515

Editat de Andrea Saracino, Paolo Mori
en Limba Engleză Paperback – 4 dec 2020
This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020. The 10 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The conference was planned at University of Surrey, Guildford, UK. Due to COVID-19 outbreak, ESORICS conference and affiliated workshop will be held online. The workshop presents new techniques for biometric and behavioral based authentication,  and authorization in the IoT and in distributed systems in general, and much more.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (5) 31395 lei  6-8 săpt.
  Springer – 24 noi 2018 31395 lei  6-8 săpt.
  Springer – 4 dec 2020 31603 lei  6-8 săpt.
  Springer – 25 ian 2020 31704 lei  6-8 săpt.
  Springer – 31 ian 2023 34225 lei  6-8 săpt.
  Springer – 14 ian 2022 34347 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 31603 lei

Preț vechi: 39504 lei
-20%

Puncte Express: 474

Preț estimativ în valută:
5588 6458$ 4828£

Carte tipărită la comandă

Livrare economică 04-18 mai


Specificații

ISBN-13: 9783030644543
ISBN-10: 3030644545
Pagini: 180
Ilustrații: VII, 169 p. 47 illus., 31 illus. in color.
Dimensiuni: 155 x 235 x 11 mm
Greutate: 0.28 kg
Ediția:1st edition 2020
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Deep Learning based Sequential Mining for User Authentication in Web Applications.- An Interoperable Architecture for Usable Password-Less Authentication.- auth.js: Advanced Authentication for the Web.- Automated and Secure Integration of the OpenID Connect iGov Pro le in Mobile Native Applications.- Micro-Id-Gym: a Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory.- IFTTT Privacy Checker.- A Comparison Among Policy Editors for Attributed Based Access Control Model.- Automatic rewalls con guration using argumentation reasoning.- On Results of Data Aggregation Operations.- The cost of having been pwned: a security service provider's perspect.