Limitations and future applications of quantum cryptography

"This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as ava...

Full description

Bibliographic Details
Other Authors: Kumar, Neeraj, 1981-, Agrawal, Alka, 1977-, Chaurasia, Brijesh Kumar, 1975-, Khan, R. A. (Raees Ahmad)
Format: eBook
Language:English
Published: Hershey, PA Information Science Reference, an imprint of IGI Global, [2021]
Series:Advances in information security, privacy, and ethics (AISPE) book series.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 04551cam a2200613 i 4500
001 koha001013539
003 OCoLC
005 20250222070004.0
006 m d
007 cr |||||||||||
008 200615s2021 paua ob 001 0 eng
010 |a  2020026780 
035 |a koha001013539 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCO  |d OCLCF  |d YDX  |d OCLCO  |d IGIGL  |d OCLCQ  |d INT  |d N$T 
019 |a 1237530864  |a 1269383832 
020 |a 1799866793  |q (electronic book) 
020 |a 9781799866794  |q (electronic bk.) 
020 |z 9781799866770  |q (hardcover) 
020 |z 9781799866787  |q (paperback) 
024 7 |a 10.4018/978-1-7998-6677-0  |2 doi 
042 |a pcc 
050 0 4 |a QA76.889  |b .L569 2021 
082 0 0 |a 004.67/8  |2 23 
049 |a MAIN 
245 0 0 |a Limitations and future applications of quantum cryptography  |c Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan. 
264 1 |a Hershey, PA  |b Information Science Reference, an imprint of IGI Global,  |c [2021] 
300 |a 1 online resource (xxvii, 305 pages)  |b illustrations (chiefly color) 
347 |a text file  |2 rdaft  |0 http://rdaregistry.info/termList/fileType/1002 
490 1 |a Advances in information security, privacy, and ethics (AISPE) book series 
500 |a "Premier Reference Source"--Taken from front cover 
504 |a Includes bibliographical references and index. 
505 0 |a VLSI architecture of substitution box / Abhishek Kumar, Suman Tripathi -- Fundamentals of quantum computing, quantum supremacy and quantum machine learning / Kamaljit Lakhtaria, Vrunda Gadesha -- Quantum security for IoT to secure healthcare applications and it's data / Binod Kumar, Sheetal Prasad -- Data hiding in color image using steganography and cryptography to support message privacy / Sabyasachi Pramanik, Ramkrishna Ghosh, Sneh Kalra, Jayeeta Majumder, Digvijay Pandey, Souvik Pal -- Quantum computing : concept, applications and need of law for its enforcement / Neeraj Kumar, Alka Agrawal -- Quantum algorithms with applications to cryptography : quantum algorithms / Renata Wong, Amandeep Bhatia -- Implications on quantum cryptography : cryptography / Varsha Sahni, Neeraj Kumar, Sujatha Krishnamoorthy -- A contemporary study on quantum-computing security mechanisms in 5G networks / Rydhm Beri -- Define security and privacy using quantum internet / Nilay Mistry, Ankit Dholakiya, Jay Prajapati -- Quantum and visual crypto biometric based secured authentication system transactions, server and locker system in cloud / Nandini C., Jahnavi S. -- The role of quantum computing in software forensics & digital evidence : issues and challenges / Sandeep Sharma, Mazhar Khaliq -- Recent progress in quantum machine learning / Amandeep Bhatia, Renata Wong -- Advances of quantum machine learning / Bhanu Chander -- Image processing using quantum computing : a review / Bably Dolly, Deepa Raj -- Quantum cryptography for securing IoT based healthcare system / Anand Sharma -- Function optimization using IBM Q / Soumyajit Goswami. 
520 |a "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"--  |c Provided by publisher 
588 0 |a Online resource; title from digital title page (viewed on March 17, 2021). 
653 0 |a Quantum computing. 
653 0 |a Cryptography. 
653 0 |a Data encryption (Computer science) 
653 0 |a Internet of things. 
653 7 |a Cryptography  |2 fast  |0 (OCoLC)fst00884552 
653 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
653 7 |a Internet of things  |2 fast  |0 (OCoLC)fst01894151 
653 7 |a Quantum computing  |2 fast  |0 (OCoLC)fst01920679 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
700 1 |a Kumar, Neeraj,  |d 1981-  |9 911844 
700 1 |a Agrawal, Alka,  |d 1977-  |9 911845 
700 1 |a Chaurasia, Brijesh Kumar,  |d 1975-  |9 911846 
700 1 |a Khan, R. A.  |q (Raees Ahmad),  |9 911847 
830 0 |a Advances in information security, privacy, and ethics (AISPE) book series.  |9 911200 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2751433.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013539 
910 |a EBSCO eBooks 
999 |c 1013539  |d 1013539 
039