Cantitate/Preț
Produs

Emerging Technologies for Authorization and Authentication: First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings: Lecture Notes in Computer Science, cartea 11263

Editat de Andrea Saracino, Paolo Mori
en Limba Engleză Paperback – 24 noi 2018
This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018.
The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures. 
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (5) 32464 lei  6-8 săpt.
  Springer International Publishing – 24 noi 2018 32464 lei  6-8 săpt.
  Springer International Publishing – 4 dec 2020 32664 lei  6-8 săpt.
  Springer International Publishing – 25 ian 2020 32762 lei  6-8 săpt.
  Springer Nature Switzerland – 31 ian 2023 35393 lei  6-8 săpt.
  Springer International Publishing – 14 ian 2022 35511 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 32464 lei

Preț vechi: 40580 lei
-20% Nou

Puncte Express: 487

Preț estimativ în valută:
6214 6403$ 5246£

Carte tipărită la comandă

Livrare economică 04-18 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030043711
ISBN-10: 3030043711
Pagini: 150
Ilustrații: IX, 129 p. 39 illus., 29 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.2 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Authentication and authorization techniques.- Authentication and authorization for interoperable IoT architecture.- Bringing Access Control Tree to Big Data.- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme.- A Protocol to Strengthen Password-Based Authentication(short paper).- Managing Private Credentials by Privacy-Preserving Biometrics.- Policy Support for Autonomous Swarms of Drones.- Violation Detection and Countermeasures.- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts.- Towards a Framework for Testing the Security of IoT Devices Consistently.- Misuse Detection in a Simulated IaaS Environment.- Dissuading Stolen Password Reuse.