Cantitate/Preț
Produs

Emerging Technologies for Authorization and Authentication: Lecture Notes in Computer Science, cartea 13782

Editat de Andrea Saracino, Paolo Mori
en Limba Engleză Paperback – 31 ian 2023
This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022.
The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions. 
They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.


 

Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (5) 31395 lei  43-57 zile
  Springer – 24 noi 2018 31395 lei  43-57 zile
  Springer – 4 dec 2020 31603 lei  43-57 zile
  Springer – 25 ian 2020 31704 lei  43-57 zile
  Springer – 31 ian 2023 34225 lei  43-57 zile
  Springer – 14 ian 2022 34347 lei  43-57 zile

Din seria Lecture Notes in Computer Science

Preț: 34225 lei

Preț vechi: 42781 lei
-20%

Puncte Express: 513

Preț estimativ în valută:
6052 6994$ 5228£

Carte tipărită la comandă

Livrare economică 04-18 mai


Specificații

ISBN-13: 9783031254666
ISBN-10: 303125466X
Pagini: 156
Ilustrații: VII, 145 p. 47 illus., 32 illus. in color.
Dimensiuni: 155 x 235 x 9 mm
Greutate: 0.25 kg
Ediția:1st edition 2023
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

An Ontology-based Approach for Setting Security Policies in Smart Homes.- Clap Auth: A Gesture-based User-Friendly Authentication Scheme to Access a Secure Infrastructure.- User Authentication on Headset-like Devices By Bio-Acoustic Signals.-The measurable Environment as Nonintrusive Authentication Factor On the Example of WiFi Beacon Frames.- Protecting FIDO Extensions against Man-in-the-Middle Attacks.- Authentication, Authorization and Selective Disclosure for IoT Data Sharing using Verifiable Credentials and Zero-Knowledge Proofs.- Privacy-Preserving Speaker Verification and Speech Recognition.- An E-Voting System Based on Tornado Cash.- Linking Contexts from Distinct Data Sources in Zero Trust Federation.