Contents
Chapter 1 Access Control Methods in the Cloud-Enabled Internet of Things
B. RAVINDER REDDY, T. ADILAKSHMI, AND C. PAVAN KUMAR
K. P. RAMAPRABHA AND N. JEYANTHI
Chapter 3 Ensuring Security through Trust in Mobile ad-hoc Networks Using Soft Computing Methods
NAGESWARARAO SIRISALA AND C. SHOBA BINDU
Chapter 4 Proof of Virtue: Nonce-Free Hash Generation in Blockchain
J. JAYAPRIYA AND N. JEYANTHI
Chapter 5 Password Authentication Using Keystroke Biometric
shubham sood and m. vanitha
Chapter 6 Healthcare Data Analytics over Big Data
E. HARI AND H. PARVEEN SULTANA