Pub Date : 1900-01-01DOI: 10.1007/978-3-031-25467-3_4
Philipp Jakubeit, Andreas Peter, Michael Steen
{"title":"The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames","authors":"Philipp Jakubeit, Andreas Peter, Michael Steen","doi":"10.1007/978-3-031-25467-3_4","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_4","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-93747-8_9
J. Corbett, Erisa Karafili
{"title":"Private Data Harvesting on Alexa Using Third-Party Skills","authors":"J. Corbett, Erisa Karafili","doi":"10.1007/978-3-030-93747-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_9","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-93747-8_8
Shurook S. Almohamade, John A. Clark, James Law
{"title":"Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction","authors":"Shurook S. Almohamade, John A. Clark, James Law","doi":"10.1007/978-3-030-93747-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_8","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-031-25467-3_1
A. M. Roffarello, Luigi De Russis
{"title":"An Ontology-Based Approach for Setting Security Policies in Smart Homes","authors":"A. M. Roffarello, Luigi De Russis","doi":"10.1007/978-3-031-25467-3_1","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_1","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-031-25467-3_2
Attaullah Buriro, Francesco Ricci
{"title":"ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure Infrastructure","authors":"Attaullah Buriro, Francesco Ricci","doi":"10.1007/978-3-031-25467-3_2","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_2","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-93747-8_1
Mehari Msgna, S. Katsikas, V. Gkioulos
{"title":"WYK: Mobile Device Authentication Using the User's Address Book","authors":"Mehari Msgna, S. Katsikas, V. Gkioulos","doi":"10.1007/978-3-030-93747-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_1","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-93747-8_7
Andrea Bisegna, R. Carbone, Silvio Ranise
{"title":"Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline","authors":"Andrea Bisegna, R. Carbone, Silvio Ranise","doi":"10.1007/978-3-030-93747-8_7","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_7","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}