edited by Yasser M. Alginahi and Muhammad Nomani Kabir
The Institution of Engineering and Technology, 2019
eISBN: 978-1-78561-557-3 | Cloth: 978-1-78561-556-6
Library of Congress Classification TK5105.59.A98 2019
Dewey Decimal Classification 004

ABOUT THIS BOOK | TOC
ABOUT THIS BOOK
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.

See other books on: Big Data | Cloud computing | IoT | Security | Security measures
See other titles from The Institution of Engineering and Technology