International Workshop Emerging Technologies for Authorization and Authentication最新文献

筛选
英文 中文
The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames 可测量环境作为非侵入性认证因素——以WiFi信标帧为例
International Workshop Emerging Technologies for Authorization and Authentication Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-25467-3_4
Philipp Jakubeit, Andreas Peter, Michael Steen
{"title":"The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames","authors":"Philipp Jakubeit, Andreas Peter, Michael Steen","doi":"10.1007/978-3-031-25467-3_4","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_4","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Private Data Harvesting on Alexa Using Third-Party Skills 使用第三方技能在Alexa上收集私人数据
International Workshop Emerging Technologies for Authorization and Authentication Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-93747-8_9
J. Corbett, Erisa Karafili
{"title":"Private Data Harvesting on Alexa Using Third-Party Skills","authors":"J. Corbett, Erisa Karafili","doi":"10.1007/978-3-030-93747-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_9","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction 针对基于行为的人机交互用户认证的模仿攻击
International Workshop Emerging Technologies for Authorization and Authentication Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-93747-8_8
Shurook S. Almohamade, John A. Clark, James Law
{"title":"Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction","authors":"Shurook S. Almohamade, John A. Clark, James Law","doi":"10.1007/978-3-030-93747-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_8","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ontology-Based Approach for Setting Security Policies in Smart Homes 基于本体的智能家居安全策略设置方法
International Workshop Emerging Technologies for Authorization and Authentication Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-25467-3_1
A. M. Roffarello, Luigi De Russis
{"title":"An Ontology-Based Approach for Setting Security Policies in Smart Homes","authors":"A. M. Roffarello, Luigi De Russis","doi":"10.1007/978-3-031-25467-3_1","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_1","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure Infrastructure ClapAuth:一种基于手势的用户友好认证方案,用于访问安全的基础设施
International Workshop Emerging Technologies for Authorization and Authentication Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-25467-3_2
Attaullah Buriro, Francesco Ricci
{"title":"ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure Infrastructure","authors":"Attaullah Buriro, Francesco Ricci","doi":"10.1007/978-3-031-25467-3_2","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_2","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Authentication on Headset-Like Devices by Bioacoustic Signals 生物声学信号在类耳机设备上的用户认证
International Workshop Emerging Technologies for Authorization and Authentication Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-25467-3_3
D. Progonov, Heorhii Naumenko, Oleksandra Sokol, Viacheslav Derkach
{"title":"User Authentication on Headset-Like Devices by Bioacoustic Signals","authors":"D. Progonov, Heorhii Naumenko, Oleksandra Sokol, Viacheslav Derkach","doi":"10.1007/978-3-031-25467-3_3","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_3","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133054328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WYK: Mobile Device Authentication Using the User's Address Book WYK:使用用户地址簿的移动设备认证
International Workshop Emerging Technologies for Authorization and Authentication Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-93747-8_1
Mehari Msgna, S. Katsikas, V. Gkioulos
{"title":"WYK: Mobile Device Authentication Using the User's Address Book","authors":"Mehari Msgna, S. Katsikas, V. Gkioulos","doi":"10.1007/978-3-030-93747-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_1","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline 在持续交付管道中集成IdM协议的渗透测试工具
International Workshop Emerging Technologies for Authorization and Authentication Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-93747-8_7
Andrea Bisegna, R. Carbone, Silvio Ranise
{"title":"Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline","authors":"Andrea Bisegna, R. Carbone, Silvio Ranise","doi":"10.1007/978-3-030-93747-8_7","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_7","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信