Introduction

Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemente...

Full description

Saved in:
Bibliographic Details
Main Authors: Kabir, M. Nomani, Alginahi, Yasser M.
Format: Book Section
Language:English
English
Published: The Institution of Engineering and Technology (IET) 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/27932/1/Chapter%201.Introduction1.pdf
http://umpir.ump.edu.my/id/eprint/27932/7/nomani2019-authentication%20technologies-ch1.pdf
http://umpir.ump.edu.my/id/eprint/27932/
https://doi.org/10.1049/PBSE009E_ch1
https://doi.org/10.1049/PBSE009E_ch1
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Pahang
Language: English
English
Description
Summary:Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemented for data in storage and data in-transit with communication network. Critical systems, e.g., energy, banking and finance, defense, transportation, business process, manufacturing, water system, and emergency services heavily rely on information systems and networks. Authentication has become an integrated part of modern computing and communication technologies, e.g., Internet of Things (IoT), cloud computing, and connected vehicles. This chapter provides an overview of the book, its theme, and purpose by introducing the topics of the book that presents the current technological advances and the new trends in authentication in information security.