Introduction
Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemente...
Main Authors: | Kabir, M. Nomani, Alginahi, Yasser M. |
---|---|
Format: | Book Section |
Language: | English English |
Published: |
The Institution of Engineering and Technology (IET)
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/27932/ http://umpir.ump.edu.my/id/eprint/27932/ http://umpir.ump.edu.my/id/eprint/27932/ http://umpir.ump.edu.my/id/eprint/27932/1/Chapter%201.Introduction1.pdf http://umpir.ump.edu.my/id/eprint/27932/7/nomani2019-authentication%20technologies-ch1.pdf |
Similar Items
-
Conclusion
by: Alginahi, Yasser M., et al.
Published: (2019) -
Simulation of Building Evacuation: Performance Analysis and Simplified Model
by: Alginahi, Yasser M., et al.
Published: (2016) -
Simulation of Oxidation Catalyst Converter for After-Treatment in Diesel Engines
by: M. Nomani, Kabir, et al.
Published: (2015) -
Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things
by: Ali, Jahan, et al.
Published: (2017) -
Optimal search algorithm in a big database using interpolation–extrapolation method
by: Kabir, M. Nomani, et al.
Published: (2019)