Authentication Technologies for Cloud Computing, IoT and Big Data

The fundamentals of authentication technologies, i.e., information security, cryptographic algorithms, data authentication algorithms, watermarking, and biometric authentication are presented with comprehensive examples and algorithmic details. The book includes some attractive topics in the era of...

Full description

Saved in:
Bibliographic Details
Other Authors: Alginahi, Yasser M., (Editor), Kabir, Muhammad Nomani, (Editor)
Format: eBook
Language: English
Published: Stevenage : IET, 2019.
Series: Security.
Subjects:
ISBN: 9781785615573
1785615572
9781523123186
1523123184
9781785615566
1785615564
Physical Description: 1 online resource (370 pages).

Cover

Table of contents

LEADER 02548cam a2200481Mi 4500
001 kn-on1101395242
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 190326s2019 enk fo 000 0 eng d
040 |a STF  |b eng  |c STF  |d OCLCO  |d OCLCF  |d OCLCQ  |d UIU  |d YDX  |d KNOVL  |d N$T  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9781785615573  |q (electronic bk.) 
020 |a 1785615572  |q (electronic bk.) 
020 |a 9781523123186  |q (electronic bk.) 
020 |a 1523123184  |q (electronic bk.) 
020 |z 9781785615566 
020 |z 1785615564 
035 |a (OCoLC)1101395242  |z (OCoLC)1091846091 
245 0 0 |a Authentication Technologies for Cloud Computing, IoT and Big Data /  |c Alginahi & Kabir [Eds]. 
260 |a Stevenage :  |b IET,  |c 2019. 
300 |a 1 online resource (370 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Security 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a The fundamentals of authentication technologies, i.e., information security, cryptographic algorithms, data authentication algorithms, watermarking, and biometric authentication are presented with comprehensive examples and algorithmic details. The book includes some attractive topics in the era of big data, IoT, cloud computing, i.e., lightweight security algorithms for IoT applications, identification schemes for post-quantum era, authentication for cloud application, cryptographic algorithms on FPGA for cloud application and data protection laws. In addition, the book provides future research directions and open problems related to the evolution of technologies. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Biometric identification. 
650 0 |a Cloud computing. 
650 0 |a Cryptography. 
650 0 |a Data protection. 
650 0 |a Field programmable gate arrays. 
650 0 |a Law. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Alginahi, Yasser M.,  |e editor. 
700 1 |a Kabir, Muhammad Nomani,  |e editor. 
776 0 8 |i Print version:  |z 9781785615573 
776 0 8 |i Print version:  |z 1785615564  |z 9781785615566  |w (OCoLC)1066028466 
830 0 |a Security. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpATCTITB1/authentication-technologies-for?kpromoter=marc  |y Full text