Cantitate/Preț
Produs

Emerging Technologies for Authorization and Authentication: Lecture Notes in Computer Science, cartea 11263

Editat de Andrea Saracino, Paolo Mori
en Limba Engleză Paperback – 24 noi 2018
This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018.
The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures. 
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (5) 31395 lei  43-57 zile
  Springer – 24 noi 2018 31395 lei  43-57 zile
  Springer – 4 dec 2020 31603 lei  43-57 zile
  Springer – 25 ian 2020 31704 lei  43-57 zile
  Springer – 31 ian 2023 34225 lei  43-57 zile
  Springer – 14 ian 2022 34347 lei  43-57 zile

Din seria Lecture Notes in Computer Science

Preț: 31395 lei

Preț vechi: 39244 lei
-20%

Puncte Express: 471

Preț estimativ în valută:
5551 6415$ 4796£

Carte tipărită la comandă

Livrare economică 04-18 mai


Specificații

ISBN-13: 9783030043711
ISBN-10: 3030043711
Pagini: 140
Ilustrații: IX, 129 p. 39 illus., 29 illus. in color.
Dimensiuni: 155 x 235 x 8 mm
Greutate: 0.22 kg
Ediția:1st ed. 2018
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Authentication and authorization techniques.- Authentication and authorization for interoperable IoT architecture.- Bringing Access Control Tree to Big Data.- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme.- A Protocol to Strengthen Password-Based Authentication(short paper).- Managing Private Credentials by Privacy-Preserving Biometrics.- Policy Support for Autonomous Swarms of Drones.- Violation Detection and Countermeasures.- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts.- Towards a Framework for Testing the Security of IoT Devices Consistently.- Misuse Detection in a Simulated IaaS Environment.- Dissuading Stolen Password Reuse.