+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Authentication Technologies for Cloud Computing, IoT and Big Data. Security - Product Image

Authentication Technologies for Cloud Computing, IoT and Big Data. Security

  • ID: 4764500
  • Book
  • IET Books
1 of 3

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.

Note: Product cover images may vary from those shown
2 of 3
- Chapter 1: Introduction
- Chapter 2: Information security
- Chapter 3: Data authentication algorithms
- Chapter 4: Cryptographic algorithms
- Chapter 5: Digital watermarking algorithms for multimedia data
- Chapter 6: Biometric authentication
- Chapter 7: Lightweight block ciphers with applications in IoT
- Chapter 8: Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT
- Chapter 9: Authentication issues for cloud applications
- Chapter 10: The insider threat problem from a cloud computing perspective
- Chapter 11: Cryptographic engines for cloud based on FPGA
- Chapter 12: Data protection laws
- Chapter 13: Conclusion
Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
Yasser M. Alginahi Visiting Scholar.
University of Windsor, Department of Electrical and Computer Engineering, Canada.

Dr. Yasser M. Alginahi is a Visiting Scholar at the University of Windsor, Department of Electrical and Computer Engineering, Canada. Previously, he was an Associate Professor at the Department of Computer Science, Taibah University, Saudi Arabia. He is a licensed Professional Engineer and a member of Professional Engineers Canada, a member of IAENG, a senior member of IEEE and IACSIT. His current research interests cover information security, document image analysis, pattern recognition, OCR, modeling and simulation, intelligent systems, and numerical computations.

Muhammad Nomani Kabir Senior Lecturer.
University Malaysia Pahang (UMP), Faculty of Computer Systems & Software Engineering, Malaysia.

Dr. Muhammad Nomani Kabir is a Senior Lecturer at the Faculty of Computer Systems & Software Engineering, University Malaysia Pahang (UMP), Malaysia. He earned a PhD in Computer Science and an MSc in Computational Sciences in Engineering from the University of Braunschweig, Germany. He is a member of IAENG. His research interests include information security, modelling and simulation, computational methods, image processing and computer networks.

Note: Product cover images may vary from those shown
Adroll
adroll