標(biāo)題: Titlebook: Emerging Technologies for Authorization and Authentication; 5th International Wo Andrea Saracino,Paolo Mori Conference proceedings 2023 Spr [打印本頁] 作者: aggression 時間: 2025-3-21 18:03
書目名稱Emerging Technologies for Authorization and Authentication影響因子(影響力)
書目名稱Emerging Technologies for Authorization and Authentication影響因子(影響力)學(xué)科排名
書目名稱Emerging Technologies for Authorization and Authentication網(wǎng)絡(luò)公開度
書目名稱Emerging Technologies for Authorization and Authentication網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Emerging Technologies for Authorization and Authentication被引頻次
書目名稱Emerging Technologies for Authorization and Authentication被引頻次學(xué)科排名
書目名稱Emerging Technologies for Authorization and Authentication年度引用
書目名稱Emerging Technologies for Authorization and Authentication年度引用學(xué)科排名
書目名稱Emerging Technologies for Authorization and Authentication讀者反饋
書目名稱Emerging Technologies for Authorization and Authentication讀者反饋學(xué)科排名
作者: 總 時間: 2025-3-21 22:23
,: A Gesture-Based User-Friendly Authentication Scheme to?Access a?Secure Infrastructure, access to a secure infrastructure. In . users are authenticated by performing clapping actions, while wearing their smartwatch in one hand. ., while users perform clapping gestures, profiles them by collecting data from their smartwatches’ built-in accelerometer and gyroscope sensors. We have evalu作者: AVERT 時間: 2025-3-22 01:53 作者: 護(hù)身符 時間: 2025-3-22 06:21
Protecting FIDO Extensions Against Man-in-the-Middle Attacks,e need to remember long passwords and, in particular, is resistant to phishing attacks. Beyond that, the FIDO protocols consider protocol extensions for more advanced use cases such as online transactions. FIDO extensions, however, are not well protected from Man-in-the-Middle (MitM) attacks. This i作者: BILIO 時間: 2025-3-22 11:01
,Authentication, Authorization, and?Selective Disclosure for?IoT Data Sharing Using Verifiable Credes and security concerns, prevent harvesting the full potentials of these data. In this paper we consider the use case of data generated by smart buildings. Buildings are becoming ever “smarter” by integrating IoT devices that improve comfort through sensing and automation. However, these devices and作者: pulmonary 時間: 2025-3-22 16:54
,Privacy-Preserving Speaker Verification and?Speech Recognition,le accuracy and data utility must remain high. Our methodology aims at protecting audio files and users’ identities through the use of encryption and hashing algorithms, while at the same time providing accurate speaker’s identity prediction. In addition, for speech recognition, we introduce a mecha作者: pulmonary 時間: 2025-3-22 20:02
,An E-Voting System Based on?Tornado Cash,ation and authorization phase, the user receives a fungible (i.e., pseudo-anonymous) voting token that can be deposited to a coin pool belonging to Tornado Cash (TC), together with an amount of Ether (ETH) . that will be used to pay successive fees. TC uses a smart contract that accepts token deposi作者: lethal 時間: 2025-3-22 23:41
,Linking Contexts from?Distinct Data Sources in?Zero Trust Federation,rify access requests. Zero Trust Federation (ZTF) has been proposed as a framework for extending an idea of identity federation to support ZTA. ZTF defines CAP as the entity that collects context and provides it to each organization (Relying Party; RP) that needs context for verification based on ZT作者: inspiration 時間: 2025-3-23 02:37
Conference proceedings 2023d paper were carefully reviewed and selected from 10 submissions.?.They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.. .?.作者: 或者發(fā)神韻 時間: 2025-3-23 06:24
New Developments in Psychometricsel security policies against inconsistencies and redundancies, and c) translate high-level security policies into device-specific policies that can be applied at run-time. The tool implements a trigger-action programming paradigm, and it exploits a hybrid formalism based on ontologies and Petri Networks.作者: 惹人反感 時間: 2025-3-23 10:54 作者: 領(lǐng)巾 時間: 2025-3-23 17:49 作者: Pillory 時間: 2025-3-23 18:24
,: A Gesture-Based User-Friendly Authentication Scheme to?Access a?Secure Infrastructure,tificial Neural Network (ANN), and K-Nearest Neighbors (KNN). KNN outperformed other two classifiers and attained . TAR at the cost of . FAR. . could be widely accepted as it utilizes users’ familiarity with a common action, such as clapping, and users are not required to remember any secret code or gesture.作者: 廚房里面 時間: 2025-3-24 00:45
0302-9743 ation, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022..The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions.?.They cover topics such as: new techniques for biometric and behavioral ba作者: 喃喃而言 時間: 2025-3-24 03:07 作者: pancreas 時間: 2025-3-24 09:03 作者: adroit 時間: 2025-3-24 11:07 作者: PLIC 時間: 2025-3-24 17:34
New Digital Technology in Educationally, a further smart contract collects preferences and, after the closure of the elections, it automatically performs the counting of votes. All the front-end has been developed in a Web browser, by using Javascript and avoiding the voter to perform any command-line operation to prepare transactions.作者: Hallowed 時間: 2025-3-24 22:29
Alexandra Shajek,Ernst Andreas Hartmanne data source and CAP. This method provides a way to collect context from some of such data sources in ZTF. Then, we implemented our method using RADIUS and MDM as data sources and confirmed that their contexts could be collected and used.作者: voluble 時間: 2025-3-25 01:17
Protecting FIDO Extensions Against Man-in-the-Middle Attacks,ol based on the CBOR Object Signing and Encryption (COSE) standard to mitigate these threats. This protocol was verified in a formal security evaluation using ProVerif and, finally, implemented in a proof-of-concept.作者: 愛哭 時間: 2025-3-25 03:26 作者: Paraplegia 時間: 2025-3-25 10:41
,Linking Contexts from?Distinct Data Sources in?Zero Trust Federation,e data source and CAP. This method provides a way to collect context from some of such data sources in ZTF. Then, we implemented our method using RADIUS and MDM as data sources and confirmed that their contexts could be collected and used.作者: syncope 時間: 2025-3-25 14:38 作者: 吸引人的花招 時間: 2025-3-25 16:13 作者: arthroscopy 時間: 2025-3-25 20:49
978-3-031-25466-6Springer Nature Switzerland AG 2023作者: Fester 時間: 2025-3-26 03:48
Emerging Technologies for Authorization and Authentication978-3-031-25467-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Bmd955 時間: 2025-3-26 05:33 作者: Atrium 時間: 2025-3-26 12:28 作者: 怕失去錢 時間: 2025-3-26 14:45
Joseph E. Stiglitz,G. Frank Mathewson on bioacoustic signals processing, such as on-body active and passive acoustic sensing. These methods are attractive due to the relatively small aging effect of the captured bioacoustic signals and low battery consumption. This makes them promising candidates for on-device user authentication..Most作者: 發(fā)怨言 時間: 2025-3-26 17:48 作者: absorbed 時間: 2025-3-27 00:38 作者: Intellectual 時間: 2025-3-27 01:18
Applications of NIMRAD in Electrochemistry,le accuracy and data utility must remain high. Our methodology aims at protecting audio files and users’ identities through the use of encryption and hashing algorithms, while at the same time providing accurate speaker’s identity prediction. In addition, for speech recognition, we introduce a mecha作者: Frequency-Range 時間: 2025-3-27 08:12
New Digital Technology in Educationation and authorization phase, the user receives a fungible (i.e., pseudo-anonymous) voting token that can be deposited to a coin pool belonging to Tornado Cash (TC), together with an amount of Ether (ETH) . that will be used to pay successive fees. TC uses a smart contract that accepts token deposi作者: Anticlimax 時間: 2025-3-27 10:17 作者: avarice 時間: 2025-3-27 14:32 作者: Grievance 時間: 2025-3-27 21:22 作者: neoplasm 時間: 2025-3-28 01:10
Joseph E. Stiglitz,G. Frank Mathewsonpplication of these methods requires usage of microphones with high sensitivity for capturing of weak acoustic signals. To overcome this limitation we suggest to perform passive sensing near the place with multiple joints, such as cervical vertebrae..The results of performance analysis proved effect作者: 大都市 時間: 2025-3-28 03:54
The Specificity of Dialectical Reason,n mind we develop a platform that enables controlled, privacy-preserving sharing of data items. Our system innovates in two directions: Firstly, it provides a framework for allowing discovery and selective disclosure of IoT data without violating their integrity. Secondly, it provides a user-friendl作者: Chromatic 時間: 2025-3-28 07:41
Applications of NIMRAD in Electrochemistry,oviders without violating privacy restrictions. The proposed methodology has been validated with a set of experiments on a well-known audio dataset, the Librispeech dataset. A type of Time Delay Neural Networks, ECAPA-TDNN was used for speaker verification, Deep Speech as a type of Recurrent Neural 作者: hauteur 時間: 2025-3-28 11:47
,User Authentication on?Headset-Like Devices by?Bioacoustic Signals,pplication of these methods requires usage of microphones with high sensitivity for capturing of weak acoustic signals. To overcome this limitation we suggest to perform passive sensing near the place with multiple joints, such as cervical vertebrae..The results of performance analysis proved effect作者: 讓空氣進(jìn)入 時間: 2025-3-28 14:37 作者: strain 時間: 2025-3-28 20:43
,Privacy-Preserving Speaker Verification and?Speech Recognition,oviders without violating privacy restrictions. The proposed methodology has been validated with a set of experiments on a well-known audio dataset, the Librispeech dataset. A type of Time Delay Neural Networks, ECAPA-TDNN was used for speaker verification, Deep Speech as a type of Recurrent Neural 作者: 1FAWN 時間: 2025-3-29 02:28 作者: 獨輪車 時間: 2025-3-29 03:09
Evaluating Large Language Models in?Process Mining: Capabilities, Benchmarks, and?Evaluation Strategd for PM on LLMs? 2) Which benchmark strategies help choose optimal LLMs for PM? 3) How do we evaluate the output of LLMs on specific PM tasks? The answer to these questions is fundamental to the development of comprehensive process mining benchmarks on LLMs covering different tasks and implementation paradigms.