๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Emerging Technologies for Authorization and Authentication: 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, Revised ... (Lecture Notes in Computer Science, 13782)

โœ Scribed by Andrea Saracino (editor), Paolo Mori (editor)


Publisher
Springer
Tongue
English
Leaves
153
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022.

The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions.ย 

They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.




ย 


โœฆ Table of Contents


Preface
Organization
Contents
An Ontology-Based Approach for Setting Security Policies in Smart Homes
1 Introduction
2 Related Work
2.1 End-User Development in the IoT
2.2 Rule Modeling and Analysis
3 The Policy Translation Point System
3.1 Adopted Models and Formalisms
3.2 User Interface
3.3 Implementation
4 Conclusions
References
ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure Infrastructure
1 Introduction
2 Related Work
2.1 Behavioral-Biometric-Based Smartwatch User Authentication
2.2 Biometric-Based Access Control
3 Approach
4 Experimental Validation
4.1 Dataset
4.2 Features
4.3 Feature Fusion
4.4 Classifier Selection
4.5 Feature Selection
4.6 Experimental Settings
4.7 Performance Evaluation
4.8 Experimental Results
5 Discussion
6 Conclusion and Future Work
References
User Authentication on Headset-Like Devices by Bioacoustic Signals
1 Introduction
2 Notations
3 Acronyms
4 Literature Review
5 Proposed Solution
6 Experiments
7 Conclusion
References
The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames
1 Introduction
2 The Measurable Environment (ME)
2.1 Illustration of the ME
2.2 Fingerprinting the ME
2.3 Classifying Fingerprints of MEs
3 Instantiation Using WiFi Beacon Frames
3.1 Dataset
3.2 Feasibility
3.3 Fingerprinting the ME
3.4 Similarity of Fingerprints and Templates
3.5 Determining the Similarity Threshold
3.6 Classifying Fingerprints
4 Performance
4.1 Classification
4.2 Validation
4.3 Results
5 Use Case: Nonintrusive Authentication
5.1 Augmenting Existing Schemes
5.2 Factor Strength
5.3 Adversary Model and Security Analysis
6 Comparison with Related Work
7 Discussion and Future Work
8 Conclusion
References
Protecting FIDO Extensions Against Man-in-the-Middle Attacks
1 Introduction
2 Background
2.1 FIDO Authentication
2.2 COSE
3 Related Work
4 Attacker Model
4.1 Vulnerable Web Intermediaries
4.2 Compromised Client Application
4.3 Malware on the Client Device
4.4 MitM Between Client Device and Authenticator
5 Protocol Design
5.1 Authenticated Encryption
5.2 Key Exchange
5.3 Data Format
5.4 Displaying User Information
6 Security Evaluation
6.1 Key Exchange
6.2 Encrypted Assertion Extensions
7 Implementation
8 Discussion
8.1 Security
8.2 Implementation
8.3 Usability
9 Conclusion and Outlook
References
Authentication, Authorization, and Selective Disclosure for IoT Data Sharing Using Verifiable Credentials and Zero-Knowledge Proofs
1 Introduction
2 Background and Related Work
2.1 Verifiable Credentials
2.2 BBS+ Digital Signatures
2.3 Related Work
3 Architecture
3.1 Data Encoding and Signing
3.2 Authentication and Authorization Request
3.3 Data Access Request
3.4 Data Access Response
4 Implementation and Evaluation
4.1 Security Properties
5 Conclusions
References
Privacy-Preserving Speaker Verification and Speech Recognition
1 Introduction
2 Related Work
3 Reference Scenario
4 Proposed Methodology
4.1 Privacy Mechanisms Enforcement
4.2 Speaker Verification Model
4.3 Speech Recognition Model
4.4 Text to Speech Model
5 Experiments
5.1 Speaker Verification Experiments
5.2 Speech Recognition Experiments
5.3 Results Discussion
6 Conclusion and Future Work
References
An E-Voting System Based on Tornado Cash*-4pt
1 Introduction
2 Background
2.1 Ethereum
2.2 The ERC20 Standard
2.3 Important Voting Properties
2.4 Tornado Cash
3 The E-Voting Model
3.1 Satisfied Properties
3.2 Cost Estimation
4 Related Work
5 Conclusion
References
Linking Contexts from Distinct Data Sources in Zero Trust Federation
1 Introduction
2 Related Research
3 The Method of Linking Context
3.1 Definition of Context Collector(CtxC)
3.2 Linking Context
4 An Example of CtxC and CAP Implementation
5 Concluding Remarks
References
Author Index


๐Ÿ“œ SIMILAR VOLUMES


Emerging Technologies for Authorization
โœ Andrea Saracino; Paolo Mori ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Springer Nature ๐ŸŒ English

This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022. The revised 8 full papers presented together with one invited

Biometric Authentication: International
โœ Massimo Tistarelli (editor), Josef Bigun (editor), Anil K. Jain (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Springer ๐ŸŒ English

<span>Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral characteristics. It associates an individual with a previously determined identity based on that individual s appearance or behavior. Because many physiological or be

Emerging Technologies for Authorization
โœ Andrea Saracino, Paolo Mori ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Springer International Publishing;Springer ๐ŸŒ English

<p>This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020. The 10 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The c

Emerging Technologies for Authorization
โœ Andrea Saracino (editor), Paolo Mori (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the proceedings of the 4</span><span><sup>th</sup></span><span> International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021. The workshop was co-located with ESORICS 2021.<br> The 11 full

Attacks and Defenses for the Internet-of
โœ Wenjuan Li, Steven Furnell, Weizhi Meng ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode.</span><p><span>The 7 full papers and 3 short

Software Foundations for Data Interopera
โœ George Fletcher (editor), Keisuke Nakano (editor), Yuya Sasaki (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes selected papers presented at the 5th International Workshop on Software Foundations for Data Interoperability, SFDI 2021, held in Copenhagen, Denmark, in August 2021. <br>The 4 full papers and one short paper were thorougly reviewed and selected from 8 submissions. They p