Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11263)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ETAA 2018.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents(10 papers)
-
Authentication and Authorization Techniques
-
Violation Detection and Countermeasures
Other volumes
-
Emerging Technologies for Authorization and Authentication
Keywords
- access control
- authentication
- behavioral analysis
- computer crime
- computer operating systems
- computer science
- data security
- distributed denial of service attack
- internet
- internet of things (iot)
- Internet of Things (IoT)
- privacy
- privacy preserving
- smart cards
- usage control
- wireless telecommunication systems
- World Wide Web
About this book
This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018.
The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures.
Editors and Affiliations
-
IIT-CNR, Pisa, Italy
Andrea Saracino, Paolo Mori
Bibliographic Information
Book Title: Emerging Technologies for Authorization and Authentication
Book Subtitle: First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings
Editors: Andrea Saracino, Paolo Mori
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-04372-8
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2018
Softcover ISBN: 978-3-030-04371-1Published: 24 November 2018
eBook ISBN: 978-3-030-04372-8Published: 23 November 2018
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: IX, 129
Number of Illustrations: 10 b/w illustrations, 29 illustrations in colour
Topics: Security, Software Engineering/Programming and Operating Systems, Information Systems Applications (incl. Internet), Computing Milieux, Computer Communication Networks, Biometrics