Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.
Reihe
Sprache
Verlagsort
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Maße
Höhe: 239 mm
Breite: 165 mm
Dicke: 25 mm
Gewicht
ISBN-13
978-1-78561-556-6 (9781785615566)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Dr. Yasser M. Alginahi is a Visiting Scholar at the University of Windsor, Department of Electrical and Computer Engineering, Canada. Previously, he was an Associate Professor at the Department of Computer Science, Taibah University, Saudi Arabia. He is a licensed Professional Engineer and a member of Professional Engineers Canada, a member of IAENG, a senior member of IEEE and IACSIT. His current research interests cover information security, document image analysis, pattern recognition, OCR, modeling and simulation, intelligent systems, and numerical computations.
Dr. Muhammad Nomani Kabir is a Senior Lecturer at the Faculty of Computer Systems & Software Engineering, University Malaysia Pahang (UMP), Malaysia. He earned a PhD in Computer Science and an MSc in Computational Sciences in Engineering from the University of Braunschweig, Germany. He is a member of IAENG. His research interests include information security, modelling and simulation, computational methods, image processing and computer networks.
Herausgeber*in
Visiting ScholarUniversity of Windsor, Department of Electrical and Computer Engineering, Canada
Senior LecturerUniversity Malaysia Pahang (UMP), Faculty of Computer Systems & Software Engineering, Malaysia
Chapter 1: Introduction
Chapter 2: Information security
Chapter 3: Data authentication algorithms
Chapter 4: Cryptographic algorithms
Chapter 5: Digital watermarking algorithms for multimedia data
Chapter 6: Biometric authentication
Chapter 7: Lightweight block ciphers with applications in IoT
Chapter 8: Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT
Chapter 9: Authentication issues for cloud applications
Chapter 10: The insider threat problem from a cloud computing perspective
Chapter 11: Cryptographic engines for cloud based on FPGA
Chapter 12: Data protection laws
Chapter 13: Conclusion