Your browser does not support JavaScript!

Authentication Technologies for Cloud Computing, IoT and Big Data

Buy e-book PDF
(plus tax if applicable)
Buy print edition
image of Authentication Technologies for Cloud Computing, IoT and Big Data
Editors: Yasser M. Alginahi 1 ; Muhammad Nomani Kabir 2
View affiliations
Publication Year: 2019

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.

Inspec keywords: law; field programmable gate arrays; cryptography; watermarking; data protection; cloud computing; Big Data; Internet of Things; biometrics (access control); message authentication

Other keywords: information security; FPGA; big data; watermarking; data protection laws; biometric authentication; cryptographic algorithms; cloud computing; data authentication algorithms; IoT; authentication technologies; lightweight security algorithms; identification schemes

Subjects: Computing security management; Legal aspects of computing; Computer communications; Data security; Cryptography; Computer networks and techniques; General and management topics; General electrical engineering topics; Internet software

Related content

This is a required field
Please enter a valid email address