Conclusion

Alginahi, Yasser M. and Kabir, M. Nomani (2019) Conclusion. In: Authentication Technologies for Cloud Computing, IoT and Big Data. The Institution of Engineering and Technology (IET), pp. 339-341. ISBN 9781785615573

[img]
Preview
Pdf
Conclusion.pdf

Download (94kB) | Preview

Abstract

The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. All these chapters include research challenges and future research directions with the evolution of technologies.

Item Type: Book Chapter
Uncontrolled Keywords: Multimedia systems; law; Big Data; cryptography; cloud computing; message authentication; biometrics (access control); Internet of Things; data protection
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty/Division: Faculty of Computer System And Software Engineering
Depositing User: Dr. Muhammad Nomani Kabir
Date Deposited: 24 Feb 2020 01:35
Last Modified: 24 Feb 2020 01:35
URI: http://umpir.ump.edu.my/id/eprint/25537
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item