000 03822nam a22006495i 4500
001 978-3-031-25467-3
003 DE-He213
005 20240730164651.0
007 cr nn 008mamaa
008 230130s2023 sz | s |||| 0|eng d
020 _a9783031254673
_9978-3-031-25467-3
024 7 _a10.1007/978-3-031-25467-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aEmerging Technologies for Authorization and Authentication
_h[electronic resource] :
_b5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers /
_cedited by Andrea Saracino, Paolo Mori.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aVII, 145 p. 47 illus., 32 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13782
505 0 _aAn Ontology-based Approach for Setting Security Policies in Smart Homes -- Clap Auth: A Gesture-based User-Friendly Authentication Scheme to Access a Secure Infrastructure -- User Authentication on Headset-like Devices By Bio-Acoustic Signals.-The measurable Environment as Nonintrusive Authentication Factor On the Example of WiFi Beacon Frames -- Protecting FIDO Extensions against Man-in-the-Middle Attacks -- Authentication, Authorization and Selective Disclosure for IoT Data Sharing using Verifiable Credentials and Zero-Knowledge Proofs -- Privacy-Preserving Speaker Verification and Speech Recognition -- An E-Voting System Based on Tornado Cash -- Linking Contexts from Distinct Data Sources in Zero Trust Federation.
520 _aThis volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022. The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions. They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment. .
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aComputer engineering.
_910164
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks
_xSecurity measures.
_93969
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_985570
650 2 4 _aComputer Engineering and Networks.
_985572
650 2 4 _aCryptology.
_931769
650 2 4 _aSecurity Services.
_978910
650 2 4 _aMobile and Network Security.
_933624
700 1 _aSaracino, Andrea.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_985574
700 1 _aMori, Paolo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_985576
710 2 _aSpringerLink (Online service)
_985578
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031254666
776 0 8 _iPrinted edition:
_z9783031254680
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13782
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-25467-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c85826
_d85826