Cantitate/Preț
Produs

Emerging Technologies for Authorization and Authentication: Lecture Notes in Computer Science, cartea 13136

Editat de Andrea Saracino, Paolo Mori
en Limba Engleză Paperback – 14 ian 2022
This book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021. The workshop was co-located with ESORICS 2021.
The 11 full papers presented in this volume were carefully reviewed and selected from 14 submissions. The workshop presents new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including smart home environment.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (5) 31395 lei  43-57 zile
  Springer – 24 noi 2018 31395 lei  43-57 zile
  Springer – 4 dec 2020 31603 lei  43-57 zile
  Springer – 25 ian 2020 31704 lei  43-57 zile
  Springer – 31 ian 2023 34225 lei  43-57 zile
  Springer – 14 ian 2022 34347 lei  43-57 zile

Din seria Lecture Notes in Computer Science

Preț: 34347 lei

Preț vechi: 42934 lei
-20%

Puncte Express: 515

Preț estimativ în valută:
6073 7019$ 5247£

Carte tipărită la comandă

Livrare economică 04-18 mai


Specificații

ISBN-13: 9783030937461
ISBN-10: 3030937461
Pagini: 180
Ilustrații: VIII, 169 p. 49 illus., 43 illus. in color.
Dimensiuni: 155 x 235 x 11 mm
Greutate: 0.28 kg
Ediția:1st edition 2021
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

WYK: Mobile Device Authentication Using the User’s Address Book.- Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions.- Heartbeat-based authentication on smartwatches in various usage contexts Hazel Murray and David Malone.- Quantum multi-factor authentication.- An Interface between Legacy and Modern Mobile Devices for Digital Identity.- Facial Recognition for Remote Electronic Voting Missing Piece of the Puzzle or Yet Another Liability? .- Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline.- Mimicry Attacks Against Behavioral-based User Authentication for Human-Robot Interaction.- Private Data Harvesting on Alexa using Third-Party Skills.- Trust Aware Continuous Authorization.- Ask App Not to Track”: The Effect of Opt-in Tracking Authorization on Mobile Privacy.