Authentication Technologies for Cloud Computing, IoT and Big Data -

Authentication Technologies for Cloud Computing, IoT and Big Data

Buch | Hardcover
368 Seiten
2019
Institution of Engineering and Technology (Verlag)
978-1-78561-556-6 (ISBN)
169,95 inkl. MwSt
This book covers the state-of-art global research on authentication technologies for security and privacy in information systems, including applications, research challenges and future research directions.
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.

Dr. Yasser M. Alginahi is a Visiting Scholar at the University of Windsor, Department of Electrical and Computer Engineering, Canada. Previously, he was an Associate Professor at the Department of Computer Science, Taibah University, Saudi Arabia. He is a licensed Professional Engineer and a member of Professional Engineers Canada, a member of IAENG, a senior member of IEEE and IACSIT. His current research interests cover information security, document image analysis, pattern recognition, OCR, modeling and simulation, intelligent systems, and numerical computations. Dr. Muhammad Nomani Kabir is a Senior Lecturer at the Faculty of Computer Systems & Software Engineering, University Malaysia Pahang (UMP), Malaysia. He earned a PhD in Computer Science and an MSc in Computational Sciences in Engineering from the University of Braunschweig, Germany. He is a member of IAENG. His research interests include information security, modelling and simulation, computational methods, image processing and computer networks.

Chapter 1: Introduction
Chapter 2: Information security
Chapter 3: Data authentication algorithms
Chapter 4: Cryptographic algorithms
Chapter 5: Digital watermarking algorithms for multimedia data
Chapter 6: Biometric authentication
Chapter 7: Lightweight block ciphers with applications in IoT
Chapter 8: Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT
Chapter 9: Authentication issues for cloud applications
Chapter 10: The insider threat problem from a cloud computing perspective
Chapter 11: Cryptographic engines for cloud based on FPGA
Chapter 12: Data protection laws
Chapter 13: Conclusion

Erscheinungsdatum
Reihe/Serie Security
Verlagsort Stevenage
Sprache englisch
Maße 156 x 234 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Nachrichtentechnik
ISBN-10 1-78561-556-4 / 1785615564
ISBN-13 978-1-78561-556-6 / 9781785615566
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich