01171nam a22002895i 4500991002186459707536cr nn 008mamaa121227s1974 gw | s |||| 0|eng d9783540383239b14134731-39ule_instBibl. Dip.le Aggr. Matematica e Fisica - Sez. Matematicaeng51023TOPO 72 - general topology and its applications[e-book] :second Pittsburgh international conference, December 18–22, 1972 /edited by Richard A. Alò, Robert W. Heath, Jun-iti Nagata Berlin :Springer,19741 online resource (651 p.)Lecture Notes in Mathematics,0075-8434 ;378MathematicsAlò, Richard A.Heath, Robert W.Nagata, Jun-itiSpringer eBookshttp://dx.doi.org/10.1007/BFb0068455An electronic book accessible through the World Wide Web.b1413473103-03-2205-09-13991002186459707536TOPO 72 - general topology and its applications80372UNISALENTOle01305-09-13m@ -enggw 0003948nam 22007215 450 991075508310332120231029103201.03-031-47198-910.1007/978-3-031-47198-8(MiAaPQ)EBC30836055(Au-PeEL)EBL30836055(DE-He213)978-3-031-47198-8(PPN)272914207(CKB)28637920000041(EXLCZ)992863792000004120231029d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSecurity and Trust Management 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings /edited by Ruben Rios, Joachim Posegga1st ed. 2023.Cham :Springer Nature Switzerland :Imprint: Springer,2023.1 online resource (153 pages)Lecture Notes in Computer Science,1611-3349 ;14336Print version: Rios, Ruben Security and Trust Management Cham : Springer,c2023 9783031471971 Includes bibliographical references and index.Impact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity -- Biometric-Based Password Management -- ‘State of the Union’: Evaluating Open Source Zero Trust Components -- Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things -- Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems -- Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case -- Privacy-Preserving NN for IDS: A Study on the impact of TFHE restrictions -- Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System -- Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance.This book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions. The workshop presents papers with topics such as security and privacy, trust models, security services, authentication, identity management, systems security, distributed systems security, privacy-preserving protocols.Lecture Notes in Computer Science,1611-3349 ;14336Data protectionComputer networksSoftware engineeringApplication softwareData miningSecurity ServicesData and Information SecurityComputer Communication NetworksSoftware EngineeringComputer and Information Systems ApplicationsData Mining and Knowledge DiscoveryData protection.Computer networks.Software engineering.Application software.Data mining.Security Services.Data and Information Security.Computer Communication Networks.Software Engineering.Computer and Information Systems Applications.Data Mining and Knowledge Discovery.005.8Rios Ruben1983-Posegga JoachimMiAaPQMiAaPQMiAaPQBOOK9910755083103321Security and Trust Management3590338UNINA