Authentication is the first line of defense in computing systems. In recent years, authentication techniques evolve rapidly from password based authentication to biometrics and public key based authentication in various applications including smart phones, sensor networks, RFID systems, internet of things, healthcare, smart grids, financial and banking systems, mobile payments, and cloud computing. This workshop will provide a forum for professionals from academia, governments and industry to share their opinions on the challenges and solutions in developing highly secure and usable authentication techniques in practical settings.
Research contributions are solicited in all areas related to authentication, including but not limited to:
05月30日
2016
会议日期
注册截止日期
留言