Showing 1 - 20 results of 3,027 for search 'By Authority,', query time: 5.19s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Emerging technologies for authorization and authentication : First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, proceedings / by ETAA (Workshop) Barcelona, Spain), SpringerLink (Online service)

    Published: Springer, 2018
    Table of Contents: “…Authentication and authorization techniques -- Authentication and authorization for interoperable IoT architecture -- Bringing Access Control Tree to Big Data -- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme -- A Protocol to Strengthen Password-Based Authentication(short paper) -- Managing Private Credentials by Privacy-Preserving Biometrics -- Policy Support for Autonomous Swarms of Drones -- Violation Detection and Countermeasures -- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts -- Towards a Framework for Testing the Security of IoT Devices Consistently -- Misuse Detection in a Simulated IaaS Environment -- Dissuading Stolen Password Reuse.…”
    Get full text
    Online Conference Proceeding Book
  15. 15

    Emerging technologies for authorization and authentication : 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers / by ETAA (Workshop) Copenhagen, Denmark), SpringerLink (Online service)

    Published: Springer, 2023
    Table of Contents: “…An Ontology-based Approach for Setting Security Policies in Smart Homes -- Clap Auth: A Gesture-based User-Friendly Authentication Scheme to Access a Secure Infrastructure -- User Authentication on Headset-like Devices By Bio-Acoustic Signals.-The measurable Environment as Nonintrusive Authentication Factor On the Example of WiFi Beacon Frames -- Protecting FIDO Extensions against Man-in-the-Middle Attacks -- Authentication, Authorization and Selective Disclosure for IoT Data Sharing using Verifiable Credentials and Zero-Knowledge Proofs -- Privacy-Preserving Speaker Verification and Speech Recognition -- An E-Voting System Based on Tornado Cash -- Linking Contexts from Distinct Data Sources in Zero Trust Federation.…”
    Get full text
    Online Conference Proceeding Book
  16. 16

    Evangelicals & Scripture : tradition, authority and hermeneutics / by PALCI EBSCO books

    Published: InterVarsity Press, 2004
    Table of Contents: “…: competing genealogies of biblical authority /…”
    Get full text
    Online Book
  17. 17
  18. 18
  19. 19

    Reclaiming the Bible for the church / by PALCI EBSCO books

    Published: T & T Clark, 1996
    Get full text
    Online Book
  20. 20