Conclusion
The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication techn...
Main Authors: | Alginahi, Yasser M., Kabir, M. Nomani |
---|---|
Format: | Book Section |
Language: | English |
Published: |
The Institution of Engineering and Technology (IET)
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/25537/ http://umpir.ump.edu.my/id/eprint/25537/ http://umpir.ump.edu.my/id/eprint/25537/ http://umpir.ump.edu.my/id/eprint/25537/1/Conclusion.pdf |
Similar Items
-
Introduction
by: Kabir, M. Nomani, et al.
Published: (2019) -
Simulation of Building Evacuation: Performance Analysis and Simplified Model
by: Alginahi, Yasser M., et al.
Published: (2016) -
Simulation of Oxidation Catalyst Converter for After-Treatment in Diesel Engines
by: M. Nomani, Kabir, et al.
Published: (2015) -
Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things
by: Ali, Jahan, et al.
Published: (2017) -
Optimal search algorithm in a big database using interpolation–extrapolation method
by: Kabir, M. Nomani, et al.
Published: (2019)