Conclusion

Access Full Text

Conclusion

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Authentication Technologies for Cloud Computing, IoT and Big Data — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Author(s): Yasser Alginahi 1  and  Muhammad Nomani Kabir 2
View affiliations
Source: Authentication Technologies for Cloud Computing, IoT and Big Data,2019
Publication date March 2019

The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. All these chapters include research challenges and future research directions with the evolution of technologies.

Chapter Contents:

  • Conclusion

Inspec keywords: multimedia systems; law; Big Data; cryptography; cloud computing; message authentication; biometrics (access control); Internet of Things; data protection

Other keywords: IoT; data protection law; Internet of Things; big data; cryptography; biometric systems; cloud computing; authentication technologies; multimedia content

Subjects: Computer networks and techniques; Legal aspects of computing; Cryptography; Multimedia communications; Computer communications; Multimedia; Data security; Computing security management; Internet software

Preview this chapter:
Zoom in
Zoomout

Conclusion, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse009e/PBSE009E_ch13-1.gif /docserver/preview/fulltext/books/sc/pbse009e/PBSE009E_ch13-2.gif

Related content

content/books/10.1049/pbse009e_ch13
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading