Authentication Technologies for Cloud Computing, IoT and Big DataКНИГИ » ПРОГРАММИНГ
Название: Authentication Technologies for Cloud Computing, IoT and Big Data Автор: Yasser M. Alginahi, Muhammad Nomani Kabir Издательство: The Institution of Engineering and Technology Серия: Security Год: 2019 Страниц: 370 Язык: английский Формат: pdf (true) Размер: 26.7 MB
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data.
Authentication is the process of verifying the identity of a user or a process that intends to access a secured system through some valid means, e.g., identification card, driver’s license, signature, password, PIN number, iris, or fingerprint. Enforcing authentication process for users or processes is extremely important for information security. Security apprentices, practitioners, and researchers need to have the knowledge of authentication processes and how to use the processes for current and new technologies, e.g., IoT, cloud computing, and big data. To fulfill the need, a new book with title ‘‘Authentication Technologies for Cloud Computing, IoT and Big Data’’ is written on in-depth topics of authentication and it is worthwhile to read this book as it covers fundamentals and advanced topics of authentication technologies.
In the book, the fundamentals of authentication technologies, i.e., information security, cryptographic algorithms, data authentication algorithms, watermarking, and biometric authentication are presented with comprehensive examples and algorithmic details. The book includes some attractive topics in the era of big data, IoT, cloud computing, i.e., lightweight security algorithms for IoT applications, identification schemes for post-quantum era, authentication for cloud application, cryptographic algorithms on FPGA for cloud application and data protection laws. In addition, the book provides future research directions and open problems related to the evolution of technologies.
The book will be a good reference for researchers (in academic and industry) who are interested in information security. The book contains the fundamental knowledge of authentication technologies which can be an excellent reference for students, teaching staff, and practitioners; and the book furthermore includes advanced topics for security experts, academic, and industrial researchers.
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
С этой публикацией часто скачивают:
Handbook of Big Data and IoT Security Название: Handbook of Big Data and IoT Security Автор: Ali Dehghantanha, Kim-Kwang Raymond Choo Издательство: Springer ISBN: 3030105423 Год: 2019 ...
Network Security and Cryptography Название: Network Security and Cryptography Автор: Sarhan M. Musa Издательство: Mercury Learning & Information Год: 2018 Формат: PDF Размер: 16...
Data Security in Cloud Computing Название: Data Security in Cloud Computing Автор: Vimal Kumar (Editor), Sivadon Chaisiri (Editor), Ryan Ko (Editor) Издательство: The Institution of...