Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама



Название: Authentication Technologies for Cloud Computing, IoT and Big Data
Автор: Yasser M. Alginahi, Muhammad Nomani Kabir
Издательство: The Institution of Engineering and Technology
Серия: Security
Год: 2019
Страниц: 370
Язык: английский
Формат: pdf (true)
Размер: 26.7 MB

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data.

Authentication is the process of verifying the identity of a user or a process that intends to access a secured system through some valid means, e.g., identification card, driver’s license, signature, password, PIN number, iris, or fingerprint. Enforcing authentication process for users or processes is extremely important for information security. Security apprentices, practitioners, and researchers need to have the knowledge of authentication processes and how to use the processes for current and new technologies, e.g., IoT, cloud computing, and big data. To fulfill the need, a new book with title ‘‘Authentication Technologies for Cloud Computing, IoT and Big Data’’ is written on in-depth topics of authentication and it is worthwhile to read this book as it covers fundamentals and advanced topics of authentication technologies.

In the book, the fundamentals of authentication technologies, i.e., information security, cryptographic algorithms, data authentication algorithms, watermarking, and biometric authentication are presented with comprehensive examples and algorithmic details. The book includes some attractive topics in the era of big data, IoT, cloud computing, i.e., lightweight security algorithms for IoT applications,
identification schemes for post-quantum era, authentication for cloud application, cryptographic algorithms on FPGA for cloud application and data protection laws. In addition, the book provides future research directions and open problems related to the evolution of technologies.

The book will be a good reference for researchers (in academic and industry) who are interested in information security. The book contains the fundamental knowledge of authentication technologies which can be an excellent reference for students, teaching staff, and practitioners; and the book furthermore includes advanced topics for security experts, academic, and industrial researchers.




Скачать с облака





НЕ РАБОТАЕТ TURBOBIT.NET? ЕСТЬ РЕШЕНИЕ, ЖМИ СЮДА!





Автор: Ingvar16 4-08-2019, 15:03 | Напечатать |
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.





С этой публикацией часто скачивают:

Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.


 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности