Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.
"synopsis" may belong to another edition of this title.
Dr. Yasser M. Alginahi is a Visiting Scholar at the University of Windsor, Department of Electrical and Computer Engineering, Canada. Previously, he was an Associate Professor at the Department of Computer Science, Taibah University, Saudi Arabia. He is a licensed Professional Engineer and a member of Professional Engineers Canada, a member of IAENG, a senior member of IEEE and IACSIT. His current research interests cover information security, document image analysis, pattern recognition, OCR, modeling and simulation, intelligent systems, and numerical computations.
Dr. Muhammad Nomani Kabir is a Senior Lecturer at the Faculty of Computer Systems & Software Engineering, University Malaysia Pahang (UMP), Malaysia. He earned a PhD in Computer Science and an MSc in Computational Sciences in Engineering from the University of Braunschweig, Germany. He is a member of IAENG. His research interests include information security, modelling and simulation, computational methods, image processing and computer networks.
"About this title" may belong to another edition of this title.
US$ 2.64 shipping within U.S.A.
Destination, rates & speedsSeller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 36430087-n
Quantity: Over 20 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar2912160170535
Quantity: Over 20 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781785615566
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 36430087
Quantity: Over 20 available
Seller: Buchpark, Trebbin, Germany
Condition: Sehr gut. Zustand: Sehr gut | Seiten: 368 | Sprache: Englisch | Produktart: Bücher. Seller Inventory # 33247970/2
Quantity: 1 available
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Hardback. Condition: New. Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws. Seller Inventory # LU-9781785615566
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 36430087
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 36430087-n
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Hardback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 185. Seller Inventory # C9781785615566
Quantity: Over 20 available
Seller: moluna, Greven, Germany
Condition: New. Inhaltsverzeichnisrnrnn Chapter 1: Introductionn Chapter 2: Information securityn Chapter 3: Data authentication algorithmsn Chapter 4: Cryptographic algorithmsn Chapter 5: Digital watermarking algorit. Seller Inventory # 255230625
Quantity: Over 20 available