Conclusion
The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication techn...
Saved in:
Main Authors: | , |
---|---|
Format: | Book Section |
Language: | English |
Published: |
The Institution of Engineering and Technology (IET)
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/25537/1/Conclusion.pdf http://umpir.ump.edu.my/id/eprint/25537/ https://doi.org/10.1049/PBSE009E_ch13 https://doi.org/10.1049/PBSE009E_ch13 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Pahang |
Language: | English |
id |
my.ump.umpir.25537 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.255372020-02-24T01:35:36Z http://umpir.ump.edu.my/id/eprint/25537/ Conclusion Alginahi, Yasser M. Kabir, M. Nomani QA75 Electronic computers. Computer science The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. All these chapters include research challenges and future research directions with the evolution of technologies. The Institution of Engineering and Technology (IET) Alginahi, Yasser M. Kabir, M. Nomani 2019 Book Section PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/25537/1/Conclusion.pdf Alginahi, Yasser M. and Kabir, M. Nomani (2019) Conclusion. In: Authentication Technologies for Cloud Computing, IoT and Big Data. The Institution of Engineering and Technology (IET), pp. 339-341. ISBN 9781785615573 https://doi.org/10.1049/PBSE009E_ch13 https://doi.org/10.1049/PBSE009E_ch13 |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Alginahi, Yasser M. Kabir, M. Nomani Conclusion |
description |
The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. All these chapters include research challenges and future research directions with the evolution of technologies. |
author2 |
Alginahi, Yasser M. |
author_facet |
Alginahi, Yasser M. Alginahi, Yasser M. Kabir, M. Nomani |
format |
Book Section |
author |
Alginahi, Yasser M. Kabir, M. Nomani |
author_sort |
Alginahi, Yasser M. |
title |
Conclusion |
title_short |
Conclusion |
title_full |
Conclusion |
title_fullStr |
Conclusion |
title_full_unstemmed |
Conclusion |
title_sort |
conclusion |
publisher |
The Institution of Engineering and Technology (IET) |
publishDate |
2019 |
url |
http://umpir.ump.edu.my/id/eprint/25537/1/Conclusion.pdf http://umpir.ump.edu.my/id/eprint/25537/ https://doi.org/10.1049/PBSE009E_ch13 https://doi.org/10.1049/PBSE009E_ch13 |
_version_ |
1662754718035738624 |