-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
Data exploration using example-based methods /
Table of Contents: “…Conclusions -- Bibliography -- Authors' biographies.…”
Get full text
Online Book -
13
-
14
-
15
Emerging technologies for authorization and authentication : First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, proceedings /
Table of Contents: “…Authentication and authorization techniques -- Authentication and authorization for interoperable IoT architecture -- Bringing Access Control Tree to Big Data -- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme -- A Protocol to Strengthen Password-Based Authentication(short paper) -- Managing Private Credentials by Privacy-Preserving Biometrics -- Policy Support for Autonomous Swarms of Drones -- Violation Detection and Countermeasures -- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts -- Towards a Framework for Testing the Security of IoT Devices Consistently -- Misuse Detection in a Simulated IaaS Environment -- Dissuading Stolen Password Reuse.…”
Get full text
Online Conference Proceeding Book -
16
Emerging technologies for authorization and authentication : 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers /
Table of Contents: “…An Ontology-based Approach for Setting Security Policies in Smart Homes -- Clap Auth: A Gesture-based User-Friendly Authentication Scheme to Access a Secure Infrastructure -- User Authentication on Headset-like Devices By Bio-Acoustic Signals.-The measurable Environment as Nonintrusive Authentication Factor On the Example of WiFi Beacon Frames -- Protecting FIDO Extensions against Man-in-the-Middle Attacks -- Authentication, Authorization and Selective Disclosure for IoT Data Sharing using Verifiable Credentials and Zero-Knowledge Proofs -- Privacy-Preserving Speaker Verification and Speech Recognition -- An E-Voting System Based on Tornado Cash -- Linking Contexts from Distinct Data Sources in Zero Trust Federation.…”
Get full text
Online Conference Proceeding Book -
17
-
18
-
19
-
20
Science under fire : challenges to scientific authority in modern America /
Table of Contents: “…Introduction: Science by association -- Making modern minds -- Resisting the modern -- A scientific state -- Science and human behavior -- Facts and values -- Two cultures -- A new right -- Cross-fertilization -- A new left -- Skepticism instantiated -- Beyond universalism -- Conclusion: Scientific authority in pieces?…”
Get full text
Online Book