Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dr. Yasser M. Alginahi is a Visiting Scholar at the University of Windsor, Department of Electrical and Computer Engineering, Canada. Previously, he was an Associate Professor at the Department of Computer Science, Taibah University, Saudi Arabia. He is a licensed Professional Engineer and a member of Professional Engineers Canada, a member of IAENG, a senior member of IEEE and IACSIT. His current research interests cover information security, document image analysis, pattern recognition, OCR, modeling and simulation, intelligent systems, and numerical computations.
Dr. Muhammad Nomani Kabir is a Senior Lecturer at the Faculty of Computer Systems & Software Engineering, University Malaysia Pahang (UMP), Malaysia. He earned a PhD in Computer Science and an MSc in Computational Sciences in Engineering from the University of Braunschweig, Germany. He is a member of IAENG. His research interests include information security, modelling and simulation, computational methods, image processing and computer networks.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher. Bestandsnummer des Verkäufers 33247970/2
Anzahl: 1 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Inhaltsverzeichnisrnrnn Chapter 1: Introductionn Chapter 2: Information securityn Chapter 3: Data authentication algorithmsn Chapter 4: Cryptographic algorithmsn Chapter 5: Digital watermarking algorit. Bestandsnummer des Verkäufers 255230625
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New. Bestandsnummer des Verkäufers 36430087-n
Anzahl: Mehr als 20 verfügbar
Anbieter: California Books, Miami, FL, USA
Zustand: New. Bestandsnummer des Verkäufers I-9781785615566
Anzahl: Mehr als 20 verfügbar
Anbieter: Rarewaves USA, OSWEGO, IL, USA
Hardback. Zustand: New. Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws. Bestandsnummer des Verkäufers LU-9781785615566
Anzahl: Mehr als 20 verfügbar
Anbieter: Rarewaves USA United, OSWEGO, IL, USA
Hardback. Zustand: New. Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws. Bestandsnummer des Verkäufers LU-9781785615566
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 36430087
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 36430087
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: New. Bestandsnummer des Verkäufers 36430087-n
Anzahl: Mehr als 20 verfügbar
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
Hardback. Zustand: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 185. Bestandsnummer des Verkäufers C9781785615566
Anzahl: Mehr als 20 verfügbar