Description |
1 online resource (370 pages) |
Series |
Security |
|
Security
|
Summary |
The fundamentals of authentication technologies, i.e., information security, cryptographic algorithms, data authentication algorithms, watermarking, and biometric authentication are presented with comprehensive examples and algorithmic details. The book includes some attractive topics in the era of big data, IoT, cloud computing, i.e., lightweight security algorithms for IoT applications, identification schemes for post-quantum era, authentication for cloud application, cryptographic algorithms on FPGA for cloud application and data protection laws. In addition, the book provides future research directions and open problems related to the evolution of technologies |
Analysis |
data protection laws |
|
FPGA |
|
identification schemes |
|
lightweight security algorithms |
|
biometric authentication |
|
watermarking |
|
data authentication algorithms |
|
cryptographic algorithms |
|
information security |
|
big data |
|
IoT |
|
cloud computing |
|
authentication technologies |
Subject |
Biometric identification.
|
|
Cloud computing.
|
|
Cryptography.
|
|
Data protection.
|
|
Field programmable gate arrays.
|
|
Law.
|
|
Biometric identification.
|
|
Cloud computing.
|
|
Cryptography.
|
|
Data protection.
|
|
Field programmable gate arrays.
|
|
Law.
|
|
Big Data.
|
|
biometrics (access control)
|
|
cloud computing.
|
|
cryptography.
|
|
data protection.
|
|
field programmable gate arrays.
|
|
Internet of Things.
|
|
law.
|
|
message authentication.
|
|
watermarking.
|
Form |
Electronic book
|
Author |
Alginahi, Yasser M., editor
|
|
Kabir, Muhammad Nomani, editor
|
ISBN |
9781785615573 |
|
1785615572 |
|
9781523123186 |
|
1523123184 |
|