Conclusion

The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication techn...

Full description

Saved in:
Bibliographic Details
Main Authors: Alginahi, Yasser M., Kabir, M. Nomani
Format: Book Section
Language:English
Published: The Institution of Engineering and Technology (IET) 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/25537/1/Conclusion.pdf
http://umpir.ump.edu.my/id/eprint/25537/
https://doi.org/10.1049/PBSE009E_ch13
https://doi.org/10.1049/PBSE009E_ch13
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Pahang
Language: English
id my.ump.umpir.25537
record_format eprints
spelling my.ump.umpir.255372020-02-24T01:35:36Z http://umpir.ump.edu.my/id/eprint/25537/ Conclusion Alginahi, Yasser M. Kabir, M. Nomani QA75 Electronic computers. Computer science The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. All these chapters include research challenges and future research directions with the evolution of technologies. The Institution of Engineering and Technology (IET) Alginahi, Yasser M. Kabir, M. Nomani 2019 Book Section PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/25537/1/Conclusion.pdf Alginahi, Yasser M. and Kabir, M. Nomani (2019) Conclusion. In: Authentication Technologies for Cloud Computing, IoT and Big Data. The Institution of Engineering and Technology (IET), pp. 339-341. ISBN 9781785615573 https://doi.org/10.1049/PBSE009E_ch13 https://doi.org/10.1049/PBSE009E_ch13
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Alginahi, Yasser M.
Kabir, M. Nomani
Conclusion
description The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. All these chapters include research challenges and future research directions with the evolution of technologies.
author2 Alginahi, Yasser M.
author_facet Alginahi, Yasser M.
Alginahi, Yasser M.
Kabir, M. Nomani
format Book Section
author Alginahi, Yasser M.
Kabir, M. Nomani
author_sort Alginahi, Yasser M.
title Conclusion
title_short Conclusion
title_full Conclusion
title_fullStr Conclusion
title_full_unstemmed Conclusion
title_sort conclusion
publisher The Institution of Engineering and Technology (IET)
publishDate 2019
url http://umpir.ump.edu.my/id/eprint/25537/1/Conclusion.pdf
http://umpir.ump.edu.my/id/eprint/25537/
https://doi.org/10.1049/PBSE009E_ch13
https://doi.org/10.1049/PBSE009E_ch13
_version_ 1662754718035738624