<?xml version="1.0" encoding="utf-8"?><rss version="2.0"><channel><title>Yasser M. Alginahi, Muhammad Nomani Kabir</title><link>https://shop.theiet.org:443/editors/yasser-m-alginahi-muhammad-nomani-kabir</link><description>Yasser M. Alginahi, Muhammad Nomani Kabir</description><item><title>Authentication Technologies for Cloud Computing, IoT and Big Data</title><link>https://shop.theiet.org:443/authentication-technologies-for-cloud-computing-iot-and-big-data</link><description>&lt;p xmlns="http://ns.editeur.org/onix/3.0/reference"&gt;Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.&lt;/p&gt;</description><pubDate>Sun, 28 Jul 2019 08:41:08 GMT</pubDate><guid isPermaLink="true">https://shop.theiet.org:443/authentication-technologies-for-cloud-computing-iot-and-big-data</guid></item></channel></rss>