-
1
-
2
The authority of the word : reflecting on image and text in northern Europe, 1400-1700 /
Get full text
Online Conference Proceeding Book -
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
Emerging technologies for authorization and authentication : First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, proceedings /
Table of Contents: “…Authentication and authorization techniques -- Authentication and authorization for interoperable IoT architecture -- Bringing Access Control Tree to Big Data -- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme -- A Protocol to Strengthen Password-Based Authentication(short paper) -- Managing Private Credentials by Privacy-Preserving Biometrics -- Policy Support for Autonomous Swarms of Drones -- Violation Detection and Countermeasures -- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts -- Towards a Framework for Testing the Security of IoT Devices Consistently -- Misuse Detection in a Simulated IaaS Environment -- Dissuading Stolen Password Reuse.…”
Get full text
Online Conference Proceeding Book -
15
Emerging technologies for authorization and authentication : 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers /
Table of Contents: “…An Ontology-based Approach for Setting Security Policies in Smart Homes -- Clap Auth: A Gesture-based User-Friendly Authentication Scheme to Access a Secure Infrastructure -- User Authentication on Headset-like Devices By Bio-Acoustic Signals.-The measurable Environment as Nonintrusive Authentication Factor On the Example of WiFi Beacon Frames -- Protecting FIDO Extensions against Man-in-the-Middle Attacks -- Authentication, Authorization and Selective Disclosure for IoT Data Sharing using Verifiable Credentials and Zero-Knowledge Proofs -- Privacy-Preserving Speaker Verification and Speech Recognition -- An E-Voting System Based on Tornado Cash -- Linking Contexts from Distinct Data Sources in Zero Trust Federation.…”
Get full text
Online Conference Proceeding Book -
16
Evangelicals & Scripture : tradition, authority and hermeneutics /
Table of Contents: “…: competing genealogies of biblical authority /…”
Get full text
Online Book -
17
-
18
-
19
-
20