Advertisement

© 2020

Emerging Technologies for Authorization and Authentication

Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings

  • Andrea Saracino
  • Paolo Mori
Conference proceedings ETAA 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11967)

Also part of the Security and Cryptology book sub series (LNSC, volume 11967)

Table of contents

  1. Front Matter
    Pages i-x
  2. Alessandro Aldini, Mirko Tagliaferri
    Pages 1-15
  3. Sowmya Ravidas, Priyanka Karkhanis, Yanja Dajsuren, Nicola Zannone
    Pages 16-34
  4. Said Daoudagh, Francesca Lonetti, Eda Marchetti
    Pages 35-51
  5. Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan
    Pages 69-85
  6. Haruna Higo, Toshiyuki Isshiki, Masahiro Nara, Satoshi Obana, Toshihiko Okamura, Hiroto Tamiya
    Pages 86-103
  7. Nikola K. Blanchard, Siargey Kachanovich, Ted Selker, Florentin Waligorski
    Pages 104-121
  8. Aysajan Abidin, Abdelrahaman Aly, Mustafa A. Mustafa
    Pages 122-137
  9. Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Silvio Ranise
    Pages 138-155
  10. Sandeep Gupta, Attaullah Buriro, Bruno Crispo
    Pages 156-170
  11. Back Matter
    Pages 189-189

About these proceedings

Introduction

This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019.
The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They focus on new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, techniques for strengthen password based authentication and for dissuading malicious users from stolen password reuse, an approach for discovering authentication vulnerabilities in interconnected accounts, and strategies to optimize the access control decision process in the Big Data scenario.

Keywords

authentication protocols computer networks computer security computer systems cryptography data communication systems data security network protocols network security security systems software engineering

Editors and affiliations

  1. 1.IIT-CNRPisaItaly
  2. 2.IIT-CNRPisaItaly

Bibliographic information