000 03669nam a22006015i 4500
001 978-3-030-93747-8
003 DE-He213
005 20240730181132.0
007 cr nn 008mamaa
008 220113s2021 sz | s |||| 0|eng d
020 _a9783030937478
_9978-3-030-93747-8
024 7 _a10.1007/978-3-030-93747-8
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aEmerging Technologies for Authorization and Authentication
_h[electronic resource] :
_b4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers /
_cedited by Andrea Saracino, Paolo Mori.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aVIII, 169 p. 49 illus., 43 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v13136
505 0 _aWYK: Mobile Device Authentication Using the User's Address Book -- Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions -- Heartbeat-based authentication on smartwatches in various usage contexts Hazel Murray and David Malone -- Quantum multi-factor authentication -- An Interface between Legacy and Modern Mobile Devices for Digital Identity -- Facial Recognition for Remote Electronic Voting Missing Piece of the Puzzle or Yet Another Liability? -- Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline -- Mimicry Attacks Against Behavioral-based User Authentication for Human-Robot Interaction -- Private Data Harvesting on Alexa using Third-Party Skills -- Trust Aware Continuous Authorization -- Ask App Not to Track": The Effect of Opt-in Tracking Authorization on Mobile Privacy.
520 _aThis book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021. The workshop was co-located with ESORICS 2021. The 11 full papers presented in this volume were carefully reviewed and selected from 14 submissions. The workshop presents new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including smart home environment.
650 0 _aData protection.
_97245
650 0 _aCoding theory.
_94154
650 0 _aInformation theory.
_914256
650 0 _aComputer networks .
_931572
650 1 4 _aData and Information Security.
_931990
650 2 4 _aSecurity Services.
_978910
650 2 4 _aCoding and Information Theory.
_9123563
650 2 4 _aComputer Communication Networks.
_9123564
700 1 _aSaracino, Andrea.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9123565
700 1 _aMori, Paolo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9123566
710 2 _aSpringerLink (Online service)
_9123567
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030937461
776 0 8 _iPrinted edition:
_z9783030937485
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v13136
_9123568
856 4 0 _uhttps://doi.org/10.1007/978-3-030-93747-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c90715
_d90715