Limitations and future applications of quantum cryptography:
The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfere...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Publisher of Timely Knowledge
[2021]
|
Schriftenreihe: | A volume in the Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-573 DE-898 DE-1049 DE-91 DE-706 DE-83 Volltext Volltext |
Zusammenfassung: | The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing |
Beschreibung: | 1 Online-Ressource (xxvii, 305 Seiten) Illustrationen |
ISBN: | 1799866793 9781799866794 |
ISSN: | 1948-9749 |
DOI: | 10.4018/978-1-7998-6677-0 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV047243909 | ||
003 | DE-604 | ||
005 | 20220331 | ||
007 | cr|uuu---uuuuu | ||
008 | 210419s2021 |||| o||u| ||||||eng d | ||
020 | |a 1799866793 |9 1-7998-6679-3 | ||
020 | |a 9781799866794 |c Online |9 978-1-7998-6679-4 | ||
024 | 7 | |a 10.4018/978-1-7998-6677-0 |2 doi | |
035 | |a (ZDB-98-IGB)978-1-7998-6679-4 | ||
035 | |a (OCoLC)1249671644 | ||
035 | |a (DE-599)HEB476936659 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1049 |a DE-91 |a DE-706 |a DE-898 |a DE-1050 |a DE-573 |a DE-83 | ||
245 | 1 | 0 | |a Limitations and future applications of quantum cryptography |c Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India) |
264 | 1 | |a Hershey PA, USA |b IGI Global, Publisher of Timely Knowledge |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a 1 Online-Ressource (xxvii, 305 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a A volume in the Advances in information security, privacy, and ethics (AISPE) book series |x 1948-9749 | |
490 | 0 | |a Premier reference source | |
520 | 3 | |a The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Aggarwal, Neeraj K. |d 1973- |0 (DE-588)1159410909 |4 edt | |
700 | 1 | |a Agrawal, Alka |0 (DE-588)170845575 |4 edt | |
700 | 1 | |a Chaurasia, Brijesh K. |4 edt | |
700 | 1 | |a Khan, Raees Ahmad |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-7998-6677-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-7998-6677-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Softcover |z 978-1-7998-6678-7 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-6677-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 0 | |u https://www.igi-global.com/gateway/book/256632 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/256632 |l DE-898 |p ZDB-1-IGE |q ZDB-1-IGE21 |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/256632 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE21 |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/256632 |l DE-91 |p ZDB-1-IGE |q TUM_Lizenz |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-6677-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079031238885376 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Aggarwal, Neeraj K. 1973- Agrawal, Alka Chaurasia, Brijesh K. Khan, Raees Ahmad |
author2_role | edt edt edt edt |
author2_variant | n k a nk nka a a aa b k c bk bkc r a k ra rak |
author_GND | (DE-588)1159410909 (DE-588)170845575 |
author_facet | Aggarwal, Neeraj K. 1973- Agrawal, Alka Chaurasia, Brijesh K. Khan, Raees Ahmad |
building | Verbundindex |
bvnumber | BV047243909 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)978-1-7998-6679-4 (OCoLC)1249671644 (DE-599)HEB476936659 |
doi_str_mv | 10.4018/978-1-7998-6677-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV047243909</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220331</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210419s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799866793</subfield><subfield code="9">1-7998-6679-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799866794</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-7998-6679-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-6677-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-7998-6679-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1249671644</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HEB476936659</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Limitations and future applications of quantum cryptography</subfield><subfield code="c">Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Publisher of Timely Knowledge</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 305 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">A volume in the Advances in information security, privacy, and ethics (AISPE) book series</subfield><subfield code="x">1948-9749</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aggarwal, Neeraj K.</subfield><subfield code="d">1973-</subfield><subfield code="0">(DE-588)1159410909</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agrawal, Alka</subfield><subfield code="0">(DE-588)170845575</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaurasia, Brijesh K.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Raees Ahmad</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-7998-6677-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-7998-6677-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Softcover</subfield><subfield code="z">978-1-7998-6678-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-6677-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.igi-global.com/gateway/book/256632</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/256632</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/256632</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/256632</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">TUM_Lizenz</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-6677-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047243909 |
illustrated | Not Illustrated |
index_date | 2024-07-03T17:05:29Z |
indexdate | 2024-07-20T06:38:31Z |
institution | BVB |
isbn | 1799866793 9781799866794 |
issn | 1948-9749 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032648116 |
oclc_num | 1249671644 |
open_access_boolean | |
owner | DE-1049 DE-91 DE-BY-TUM DE-706 DE-898 DE-BY-UBR DE-1050 DE-573 DE-83 |
owner_facet | DE-1049 DE-91 DE-BY-TUM DE-706 DE-898 DE-BY-UBR DE-1050 DE-573 DE-83 |
physical | 1 Online-Ressource (xxvii, 305 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-1-IGE ZDB-1-IGE21 ZDB-1-IGE TUM_Lizenz ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IGI Global, Publisher of Timely Knowledge |
record_format | marc |
series2 | A volume in the Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spelling | Limitations and future applications of quantum cryptography Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India) Hershey PA, USA IGI Global, Publisher of Timely Knowledge [2021] © 2021 1 Online-Ressource (xxvii, 305 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier A volume in the Advances in information security, privacy, and ethics (AISPE) book series 1948-9749 Premier reference source The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing (DE-588)4143413-4 Aufsatzsammlung gnd-content Aggarwal, Neeraj K. 1973- (DE-588)1159410909 edt Agrawal, Alka (DE-588)170845575 edt Chaurasia, Brijesh K. edt Khan, Raees Ahmad edt Erscheint auch als Druck-Ausgabe 978-1-7998-6677-0 Erscheint auch als Druck-Ausgabe 1-7998-6677-7 Erscheint auch als Druck-Ausgabe, Softcover 978-1-7998-6678-7 https://doi.org/10.4018/978-1-7998-6677-0 Verlag URL des Erstveröffentlichers Volltext https://www.igi-global.com/gateway/book/256632 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Limitations and future applications of quantum cryptography |
subject_GND | (DE-588)4143413-4 |
title | Limitations and future applications of quantum cryptography |
title_auth | Limitations and future applications of quantum cryptography |
title_exact_search | Limitations and future applications of quantum cryptography |
title_exact_search_txtP | Limitations and future applications of quantum cryptography |
title_full | Limitations and future applications of quantum cryptography Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India) |
title_fullStr | Limitations and future applications of quantum cryptography Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India) |
title_full_unstemmed | Limitations and future applications of quantum cryptography Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India) |
title_short | Limitations and future applications of quantum cryptography |
title_sort | limitations and future applications of quantum cryptography |
topic_facet | Aufsatzsammlung |
url | https://doi.org/10.4018/978-1-7998-6677-0 https://www.igi-global.com/gateway/book/256632 |
work_keys_str_mv | AT aggarwalneerajk limitationsandfutureapplicationsofquantumcryptography AT agrawalalka limitationsandfutureapplicationsofquantumcryptography AT chaurasiabrijeshk limitationsandfutureapplicationsofquantumcryptography AT khanraeesahmad limitationsandfutureapplicationsofquantumcryptography |