|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
KNOVEL_on1101395242 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
190326s2019 enk fo 000 0 eng d |
040 |
|
|
|a STF
|b eng
|c STF
|d OCLCO
|d OCLCF
|d OCLCQ
|d UIU
|d YDX
|d KNOVL
|d N$T
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1091846091
|
020 |
|
|
|a 9781785615573
|q (electronic bk.)
|
020 |
|
|
|a 1785615572
|q (electronic bk.)
|
020 |
|
|
|a 9781523123186
|q (electronic bk.)
|
020 |
|
|
|a 1523123184
|q (electronic bk.)
|
020 |
|
|
|z 9781785615566
|
020 |
|
|
|z 1785615564
|
029 |
1 |
|
|a AU@
|b 000065261019
|
035 |
|
|
|a (OCoLC)1101395242
|z (OCoLC)1091846091
|
050 |
|
4 |
|a TK7882.B56
|
072 |
|
7 |
|a B0100
|2 inspec
|
072 |
|
7 |
|a B6120D
|2 inspec
|
072 |
|
7 |
|a B6210L
|2 inspec
|
072 |
|
7 |
|a C0000
|2 inspec
|
072 |
|
7 |
|a C0230B
|2 inspec
|
072 |
|
7 |
|a C5620
|2 inspec
|
072 |
|
7 |
|a C6130S
|2 inspec
|
072 |
|
7 |
|a C6190J
|2 inspec
|
072 |
|
7 |
|a C0310S
|2 inspec
|
072 |
|
7 |
|a C5480
|2 inspec
|
082 |
0 |
4 |
|a 006.248
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Authentication Technologies for Cloud Computing, IoT and Big Data /
|c Alginahi & Kabir [Eds].
|
260 |
|
|
|a Stevenage :
|b IET,
|c 2019.
|
300 |
|
|
|a 1 online resource (370 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Security
|
520 |
|
|
|a The fundamentals of authentication technologies, i.e., information security, cryptographic algorithms, data authentication algorithms, watermarking, and biometric authentication are presented with comprehensive examples and algorithmic details. The book includes some attractive topics in the era of big data, IoT, cloud computing, i.e., lightweight security algorithms for IoT applications, identification schemes for post-quantum era, authentication for cloud application, cryptographic algorithms on FPGA for cloud application and data protection laws. In addition, the book provides future research directions and open problems related to the evolution of technologies.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Biometric identification.
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Field programmable gate arrays.
|
650 |
|
0 |
|a Law.
|
650 |
|
6 |
|a Identification biométrique.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Réseaux logiques programmables par l'utilisateur.
|
650 |
|
7 |
|a Biometric identification.
|2 fast
|0 (OCoLC)fst00832607
|
650 |
|
7 |
|a Cloud computing.
|2 fast
|0 (OCoLC)fst01745899
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Field programmable gate arrays.
|2 fast
|0 (OCoLC)fst00923910
|
650 |
|
7 |
|a Law.
|2 fast
|0 (OCoLC)fst00993678
|
650 |
|
7 |
|a Big Data.
|2 inspect
|
650 |
|
7 |
|a biometrics (access control)
|2 inspect
|
650 |
|
7 |
|a cloud computing.
|2 inspect
|
650 |
|
7 |
|a cryptography.
|2 inspect
|
650 |
|
7 |
|a data protection.
|2 inspect
|
650 |
|
7 |
|a field programmable gate arrays.
|2 inspect
|
650 |
|
7 |
|a Internet of Things.
|2 inspect
|
650 |
|
7 |
|a law.
|2 inspect
|
650 |
|
7 |
|a message authentication.
|2 inspect
|
650 |
|
7 |
|a watermarking.
|2 inspect
|
653 |
|
|
|a data protection laws
|
653 |
|
|
|a FPGA
|
653 |
|
|
|a identification schemes
|
653 |
|
|
|a lightweight security algorithms
|
653 |
|
|
|a biometric authentication
|
653 |
|
|
|a watermarking
|
653 |
|
|
|a data authentication algorithms
|
653 |
|
|
|a cryptographic algorithms
|
653 |
|
|
|a information security
|
653 |
|
|
|a big data
|
653 |
|
|
|a IoT
|
653 |
|
|
|a cloud computing
|
653 |
|
|
|a authentication technologies
|
700 |
1 |
|
|a Alginahi, Yasser M.,
|e editor.
|
700 |
1 |
|
|a Kabir, Muhammad Nomani,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|z 9781785615573
|
776 |
0 |
8 |
|i Print version:
|z 1785615564
|z 9781785615566
|w (OCoLC)1066028466
|
830 |
|
0 |
|a Security.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpATCTITB1/toc
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16145208
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2094601
|
994 |
|
|
|a 92
|b IZTAP
|