Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.
"Sinopsis" puede pertenecer a otra edición de este libro.
Dr. Yasser M. Alginahi is a Visiting Scholar at the University of Windsor, Department of Electrical and Computer Engineering, Canada. Previously, he was an Associate Professor at the Department of Computer Science, Taibah University, Saudi Arabia. He is a licensed Professional Engineer and a member of Professional Engineers Canada, a member of IAENG, a senior member of IEEE and IACSIT. His current research interests cover information security, document image analysis, pattern recognition, OCR, modeling and simulation, intelligent systems, and numerical computations.
Dr. Muhammad Nomani Kabir is a Senior Lecturer at the Faculty of Computer Systems & Software Engineering, University Malaysia Pahang (UMP), Malaysia. He earned a PhD in Computer Science and an MSc in Computational Sciences in Engineering from the University of Braunschweig, Germany. He is a member of IAENG. His research interests include information security, modelling and simulation, computational methods, image processing and computer networks.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 14,90 gastos de envío desde Alemania a España
Destinos, gastos y plazos de envíoEUR 16,97 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: Buchpark, Trebbin, Alemania
Condición: Sehr gut. Zustand: Sehr gut | Seiten: 368 | Sprache: Englisch | Produktart: Bücher. Nº de ref. del artículo: 33247970/2
Cantidad disponible: 1 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 36430087-n
Cantidad disponible: Más de 20 disponibles
Librería: California Books, Miami, FL, Estados Unidos de America
Condición: New. Nº de ref. del artículo: I-9781785615566
Cantidad disponible: Más de 20 disponibles
Librería: Rarewaves USA, OSWEGO, IL, Estados Unidos de America
Hardback. Condición: New. Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws. Nº de ref. del artículo: LU-9781785615566
Cantidad disponible: Más de 20 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Inhaltsverzeichnisrnrnn Chapter 1: Introductionn Chapter 2: Information securityn Chapter 3: Data authentication algorithmsn Chapter 4: Cryptographic algorithmsn Chapter 5: Digital watermarking algorit. Nº de ref. del artículo: 255230625
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 36430087
Cantidad disponible: Más de 20 disponibles
Librería: Rarewaves USA United, OSWEGO, IL, Estados Unidos de America
Hardback. Condición: New. Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws. Nº de ref. del artículo: LU-9781785615566
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 36430087
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
Condición: New. Nº de ref. del artículo: 36430087-n
Cantidad disponible: Más de 20 disponibles
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
Hardback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 185. Nº de ref. del artículo: C9781785615566
Cantidad disponible: Más de 20 disponibles