Authentication Technologies for Cloud Computing, IoT and Big Data

Author:   Yasser M. Alginahi (Visiting Scholar, University of Windsor, Department of Electrical and Computer Engineering, Canada) ,  Muhammad Nomani Kabir (Senior Lecturer, University Malaysia Pahang (UMP), Faculty of Computer Systems & Software Engineering, Malaysia)
Publisher:   Institution of Engineering and Technology
ISBN:  

9781785615566


Pages:   368
Publication Date:   06 May 2019
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $435.60 Quantity:  
Add to Cart

Share |

Authentication Technologies for Cloud Computing, IoT and Big Data


Add your own review!

Overview

Full Product Details

Author:   Yasser M. Alginahi (Visiting Scholar, University of Windsor, Department of Electrical and Computer Engineering, Canada) ,  Muhammad Nomani Kabir (Senior Lecturer, University Malaysia Pahang (UMP), Faculty of Computer Systems & Software Engineering, Malaysia)
Publisher:   Institution of Engineering and Technology
Imprint:   Institution of Engineering and Technology
ISBN:  

9781785615566


ISBN 10:   1785615564
Pages:   368
Publication Date:   06 May 2019
Audience:   College/higher education ,  Professional and scholarly ,  Tertiary & Higher Education ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Chapter 1: Introduction Chapter 2: Information security Chapter 3: Data authentication algorithms Chapter 4: Cryptographic algorithms Chapter 5: Digital watermarking algorithms for multimedia data Chapter 6: Biometric authentication Chapter 7: Lightweight block ciphers with applications in IoT Chapter 8: Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT Chapter 9: Authentication issues for cloud applications Chapter 10: The insider threat problem from a cloud computing perspective Chapter 11: Cryptographic engines for cloud based on FPGA Chapter 12: Data protection laws Chapter 13: Conclusion

Reviews

Author Information

Dr. Yasser M. Alginahi is a Visiting Scholar at the University of Windsor, Department of Electrical and Computer Engineering, Canada. Previously, he was an Associate Professor at the Department of Computer Science, Taibah University, Saudi Arabia. He is a licensed Professional Engineer and a member of Professional Engineers Canada, a member of IAENG, a senior member of IEEE and IACSIT. His current research interests cover information security, document image analysis, pattern recognition, OCR, modeling and simulation, intelligent systems, and numerical computations. Dr. Muhammad Nomani Kabir is a Senior Lecturer at the Faculty of Computer Systems & Software Engineering, University Malaysia Pahang (UMP), Malaysia. He earned a PhD in Computer Science and an MSc in Computational Sciences in Engineering from the University of Braunschweig, Germany. He is a member of IAENG. His research interests include information security, modelling and simulation, computational methods, image processing and computer networks.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List