Authentication technologies for cloud computing, IoT and big data:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Institution of Engineering and Technology
2019
|
Schriftenreihe: | IET security series
9 |
Schlagworte: | |
Online-Zugang: | FWS01 FWS02 TUM01 UBT01 UBY01 UER01 Volltext |
Beschreibung: | 1 Online-Ressource (xi, 354 Seiten) Illustrationen, Diagramme |
ISBN: | 9781785615573 |
DOI: | 10.1049/PBSE009E |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV046303400 | ||
003 | DE-604 | ||
005 | 20230420 | ||
007 | cr|uuu---uuuuu | ||
008 | 191213s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781785615573 |c Online |9 978-1-78561-557-3 | ||
024 | 7 | |a 10.1049/PBSE009E |2 doi | |
035 | |a (OCoLC)1135431719 | ||
035 | |a (DE-599)BVBBV046303400 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29 |a DE-863 |a DE-862 |a DE-703 |a DE-706 |a DE-91 | ||
084 | |a DAT 620 |2 stub | ||
084 | |a SOZ 611 |2 stub | ||
245 | 1 | 0 | |a Authentication technologies for cloud computing, IoT and big data |c edited by Yasser M. Alginahi and Muhammad Nomani Kabir |
264 | 1 | |a London |b Institution of Engineering and Technology |c 2019 | |
300 | |a 1 Online-Ressource (xi, 354 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a IET security series |v 9 | |
650 | 4 | |a data protection laws | |
650 | 4 | |a FPGA | |
650 | 4 | |a identification schemes | |
650 | 4 | |a lightweight security algorithms | |
650 | 4 | |a biometric authentication | |
650 | 4 | |a watermarking | |
650 | 4 | |a data authentication algorithms | |
650 | 4 | |a cryptographic algorithms | |
650 | 4 | |a information security | |
650 | 4 | |a big data | |
650 | 4 | |a IoT | |
650 | 4 | |a cloud computing | |
650 | 4 | |a authentication technologies | |
650 | 4 | |a Biometric identification | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data protection | |
650 | 4 | |a Field programmable gate arrays | |
650 | 4 | |a Law | |
650 | 7 | |a Biometric identification |2 fast | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Field programmable gate arrays |2 fast | |
650 | 7 | |a Law |2 fast | |
650 | 7 | |a Big Data |2 inspect | |
650 | 7 | |a biometrics (access control) |2 inspect | |
650 | 7 | |a cloud computing |2 inspect | |
650 | 7 | |a cryptography |2 inspect | |
650 | 7 | |a data protection |2 inspect | |
650 | 7 | |a field programmable gate arrays |2 inspect | |
650 | 7 | |a Internet of Things |2 inspect | |
650 | 7 | |a law |2 inspect | |
650 | 7 | |a message authentication |2 inspect | |
650 | 7 | |a watermarking |2 inspect | |
700 | 1 | |a Alginahi, Yasser M. |4 edt | |
700 | 1 | |a Kabir, Muhammad Noman |d 1977- |0 (DE-588)133784371 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-78561-556-6 |
830 | 0 | |a IET security series |v 9 |w (DE-604)BV047143178 |9 9 | |
856 | 4 | 0 | |u https://doi.org/10.1049/PBSE009E |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-100-IET |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031680670 | ||
966 | e | |u https://doi.org/10.1049/PBSE009E |l FWS01 |p ZDB-100-IET |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBSE009E |l FWS02 |p ZDB-100-IET |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=5749962 |l TUM01 |p ZDB-30-PQE |q TUM_Einzelkauf_2023 |x Aggregator |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBSE009E |l UBT01 |p ZDB-100-IET |q UBT_PDA_IET_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBSE009E |l UBY01 |p ZDB-100-IET |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBSE009E |l UER01 |p ZDB-100-IET |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 847876 |
---|---|
_version_ | 1806192155952152576 |
any_adam_object | |
author2 | Alginahi, Yasser M. Kabir, Muhammad Noman 1977- |
author2_role | edt edt |
author2_variant | y m a ym yma m n k mn mnk |
author_GND | (DE-588)133784371 |
author_facet | Alginahi, Yasser M. Kabir, Muhammad Noman 1977- |
building | Verbundindex |
bvnumber | BV046303400 |
classification_tum | DAT 620 SOZ 611 |
collection | ZDB-100-IET ZDB-30-PQE |
ctrlnum | (OCoLC)1135431719 (DE-599)BVBBV046303400 |
discipline | Informatik Soziologie |
doi_str_mv | 10.1049/PBSE009E |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03313nmm a2200853 cb4500</leader><controlfield tag="001">BV046303400</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230420 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">191213s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785615573</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-78561-557-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1049/PBSE009E</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1135431719</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046303400</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 620</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SOZ 611</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Authentication technologies for cloud computing, IoT and big data</subfield><subfield code="c">edited by Yasser M. Alginahi and Muhammad Nomani Kabir</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Institution of Engineering and Technology</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 354 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IET security series</subfield><subfield code="v">9</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">data protection laws</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">FPGA</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">identification schemes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">lightweight security algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">biometric authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">watermarking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">data authentication algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cryptographic algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">information security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">big data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IoT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">authentication technologies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometric identification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Field programmable gate arrays</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Law</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Biometric identification</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Field programmable gate arrays</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Law</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Big Data</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">biometrics (access control)</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cloud computing</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptography</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">data protection</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">field programmable gate arrays</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of Things</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">law</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">message authentication</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">watermarking</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alginahi, Yasser M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kabir, Muhammad Noman</subfield><subfield code="d">1977-</subfield><subfield code="0">(DE-588)133784371</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-78561-556-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IET security series</subfield><subfield code="v">9</subfield><subfield code="w">(DE-604)BV047143178</subfield><subfield code="9">9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1049/PBSE009E</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-100-IET</subfield><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031680670</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE009E</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE009E</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=5749962</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_Einzelkauf_2023</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE009E</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="q">UBT_PDA_IET_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE009E</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE009E</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046303400 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T15:31:09Z |
institution | BVB |
isbn | 9781785615573 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031680670 |
oclc_num | 1135431719 |
open_access_boolean | |
owner | DE-29 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-703 DE-706 DE-91 DE-BY-TUM |
owner_facet | DE-29 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-703 DE-706 DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xi, 354 Seiten) Illustrationen, Diagramme |
psigel | ZDB-100-IET ZDB-30-PQE ZDB-30-PQE TUM_Einzelkauf_2023 ZDB-100-IET UBT_PDA_IET_Kauf |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Institution of Engineering and Technology |
record_format | marc |
series | IET security series |
series2 | IET security series |
spellingShingle | Authentication technologies for cloud computing, IoT and big data IET security series data protection laws FPGA identification schemes lightweight security algorithms biometric authentication watermarking data authentication algorithms cryptographic algorithms information security big data IoT cloud computing authentication technologies Biometric identification Cloud computing Cryptography Data protection Field programmable gate arrays Law Biometric identification fast Cloud computing fast Cryptography fast Data protection fast Field programmable gate arrays fast Law fast Big Data inspect biometrics (access control) inspect cloud computing inspect cryptography inspect data protection inspect field programmable gate arrays inspect Internet of Things inspect law inspect message authentication inspect watermarking inspect |
title | Authentication technologies for cloud computing, IoT and big data |
title_auth | Authentication technologies for cloud computing, IoT and big data |
title_exact_search | Authentication technologies for cloud computing, IoT and big data |
title_full | Authentication technologies for cloud computing, IoT and big data edited by Yasser M. Alginahi and Muhammad Nomani Kabir |
title_fullStr | Authentication technologies for cloud computing, IoT and big data edited by Yasser M. Alginahi and Muhammad Nomani Kabir |
title_full_unstemmed | Authentication technologies for cloud computing, IoT and big data edited by Yasser M. Alginahi and Muhammad Nomani Kabir |
title_short | Authentication technologies for cloud computing, IoT and big data |
title_sort | authentication technologies for cloud computing iot and big data |
topic | data protection laws FPGA identification schemes lightweight security algorithms biometric authentication watermarking data authentication algorithms cryptographic algorithms information security big data IoT cloud computing authentication technologies Biometric identification Cloud computing Cryptography Data protection Field programmable gate arrays Law Biometric identification fast Cloud computing fast Cryptography fast Data protection fast Field programmable gate arrays fast Law fast Big Data inspect biometrics (access control) inspect cloud computing inspect cryptography inspect data protection inspect field programmable gate arrays inspect Internet of Things inspect law inspect message authentication inspect watermarking inspect |
topic_facet | data protection laws FPGA identification schemes lightweight security algorithms biometric authentication watermarking data authentication algorithms cryptographic algorithms information security big data IoT cloud computing authentication technologies Biometric identification Cloud computing Cryptography Data protection Field programmable gate arrays Law Big Data biometrics (access control) cryptography data protection field programmable gate arrays Internet of Things law message authentication |
url | https://doi.org/10.1049/PBSE009E |
volume_link | (DE-604)BV047143178 |
work_keys_str_mv | AT alginahiyasserm authenticationtechnologiesforcloudcomputingiotandbigdata AT kabirmuhammadnoman authenticationtechnologiesforcloudcomputingiotandbigdata |