Authentication Technologies for Cloud Computing, IoT and Big Data

The fundamentals of authentication technologies, i.e., information security, cryptographic algorithms, data authentication algorithms, watermarking, and biometric authentication are presented with comprehensive examples and algorithmic details. The book includes some attractive topics in the era of...

Full description

Saved in:
Bibliographic Details
Other Authors: Alginahi, Yasser M., (Editor), Kabir, Muhammad Nomani, (Editor)
Format: eBook
Language: English
Published: Stevenage : IET, 2019.
Series: Security.
Subjects:
ISBN: 9781785615573
1785615572
9781523123186
1523123184
9781785615566
1785615564
Physical Description: 1 online resource (370 pages).

Cover

Table of contents

Description
Summary: The fundamentals of authentication technologies, i.e., information security, cryptographic algorithms, data authentication algorithms, watermarking, and biometric authentication are presented with comprehensive examples and algorithmic details. The book includes some attractive topics in the era of big data, IoT, cloud computing, i.e., lightweight security algorithms for IoT applications, identification schemes for post-quantum era, authentication for cloud application, cryptographic algorithms on FPGA for cloud application and data protection laws. In addition, the book provides future research directions and open problems related to the evolution of technologies.
ISBN: 9781785615573
1785615572
9781523123186
1523123184
9781785615566
1785615564
Access: Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty