Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications:
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer Nature Singapore
2024
Singapore Springer |
Ausgabe: | 1st ed. 2024 |
Schriftenreihe: | Contributions to Environmental Sciences & Innovative Business Technology
|
Schlagworte: | |
Online-Zugang: | DE-634 DE-1046 DE-1028 DE-1050 DE-M347 DE-91 DE-384 DE-19 DE-703 DE-824 DE-739 Volltext |
Beschreibung: | 1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color) |
ISBN: | 9789819700882 |
ISSN: | 2731-8311 |
DOI: | 10.1007/978-981-97-0088-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV049673948 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240503s2024 |||| o||u| ||||||eng d | ||
020 | |a 9789819700882 |c Online |9 978-981-9700-88-2 | ||
024 | 7 | |a 10.1007/978-981-97-0088-2 |2 doi | |
035 | |a (ZDB-2-EES)9789819700882 | ||
035 | |a (OCoLC)1437848436 | ||
035 | |a (DE-599)BVBBV049673948 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-1028 |a DE-1046 |a DE-384 |a DE-M347 |a DE-188 |a DE-703 |a DE-1050 |a DE-739 |a DE-634 |a DE-824 | ||
082 | 0 | |a 304.2 |2 23 | |
084 | |a UMW 000 |2 stub | ||
084 | |a GEO 000 |2 stub | ||
245 | 1 | 0 | |a Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications |c edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan |
250 | |a 1st ed. 2024 | ||
264 | 1 | |a Singapore |b Springer Nature Singapore |c 2024 | |
264 | 1 | |a Singapore |b Springer | |
300 | |a 1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Contributions to Environmental Sciences & Innovative Business Technology |x 2731-8311 | |
650 | 4 | |a Sustainability | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Blockchain | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Security Services | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Sustainability | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Blockchains (Databases) | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Information theory | |
650 | 4 | |a Data protection | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
700 | 1 | |a Kumar, Adarsh |4 edt | |
700 | 1 | |a Ahuja, Neelu Jyothi |4 edt | |
700 | 1 | |a Kaushik, Keshav |4 edt | |
700 | 1 | |a Tomar, Deepak Singh |4 edt | |
700 | 1 | |a Khan, Surbhi Bhatia |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-9700-87-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-9700-89-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-9700-90-5 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-97-0088-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-EES | ||
940 | 1 | |q ZDB-2-EES_2024 | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-634 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-1046 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-1028 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-1050 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-M347 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-91 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-384 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-19 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-703 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-824 |p ZDB-2-EES |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-0088-2 |l DE-739 |p ZDB-2-EES |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805082282155835392 |
---|---|
adam_text | |
any_adam_object | |
author2 | Kumar, Adarsh Ahuja, Neelu Jyothi Kaushik, Keshav Tomar, Deepak Singh Khan, Surbhi Bhatia |
author2_role | edt edt edt edt edt |
author2_variant | a k ak n j a nj nja k k kk d s t ds dst s b k sb sbk |
author_facet | Kumar, Adarsh Ahuja, Neelu Jyothi Kaushik, Keshav Tomar, Deepak Singh Khan, Surbhi Bhatia |
building | Verbundindex |
bvnumber | BV049673948 |
classification_tum | UMW 000 GEO 000 |
collection | ZDB-2-EES |
ctrlnum | (ZDB-2-EES)9789819700882 (OCoLC)1437848436 (DE-599)BVBBV049673948 |
dewey-full | 304.2 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 304 - Factors affecting social behavior |
dewey-raw | 304.2 |
dewey-search | 304.2 |
dewey-sort | 3304.2 |
dewey-tens | 300 - Social sciences |
discipline | Geowissenschaften Soziologie Umwelt |
doi_str_mv | 10.1007/978-981-97-0088-2 |
edition | 1st ed. 2024 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zcb4500</leader><controlfield tag="001">BV049673948</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240503s2024 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789819700882</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-9700-88-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-97-0088-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-EES)9789819700882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1437848436</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049673948</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1028</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-824</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">304.2</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">UMW 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">GEO 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications</subfield><subfield code="c">edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Contributions to Environmental Sciences & Innovative Business Technology</subfield><subfield code="x">2731-8311</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sustainability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Blockchain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sustainability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Blockchains (Databases)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Adarsh</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahuja, Neelu Jyothi</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaushik, Keshav</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tomar, Deepak Singh</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Surbhi Bhatia</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9700-87-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9700-89-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9700-90-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-EES</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-EES_2024</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-1028</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049673948 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T07:30:11Z |
institution | BVB |
isbn | 9789819700882 |
issn | 2731-8311 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035016895 |
oclc_num | 1437848436 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1028 DE-1046 DE-384 DE-M347 DE-188 DE-703 DE-1050 DE-739 DE-634 DE-824 |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1028 DE-1046 DE-384 DE-M347 DE-188 DE-703 DE-1050 DE-739 DE-634 DE-824 |
physical | 1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color) |
psigel | ZDB-2-EES ZDB-2-EES_2024 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Springer Nature Singapore Springer |
record_format | marc |
series2 | Contributions to Environmental Sciences & Innovative Business Technology |
spelling | Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan 1st ed. 2024 Singapore Springer Nature Singapore 2024 Singapore Springer 1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color) txt rdacontent c rdamedia cr rdacarrier Contributions to Environmental Sciences & Innovative Business Technology 2731-8311 Sustainability Mobile and Network Security Blockchain Data Structures and Information Theory Security Services Cryptology Computer networks / Security measures Blockchains (Databases) Data structures (Computer science) Information theory Data protection Cryptography Data encryption (Computer science) Kumar, Adarsh edt Ahuja, Neelu Jyothi edt Kaushik, Keshav edt Tomar, Deepak Singh edt Khan, Surbhi Bhatia edt Erscheint auch als Druck-Ausgabe 978-981-9700-87-5 Erscheint auch als Druck-Ausgabe 978-981-9700-89-9 Erscheint auch als Druck-Ausgabe 978-981-9700-90-5 https://doi.org/10.1007/978-981-97-0088-2 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications Sustainability Mobile and Network Security Blockchain Data Structures and Information Theory Security Services Cryptology Computer networks / Security measures Blockchains (Databases) Data structures (Computer science) Information theory Data protection Cryptography Data encryption (Computer science) |
title | Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications |
title_auth | Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications |
title_exact_search | Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications |
title_full | Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan |
title_fullStr | Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan |
title_full_unstemmed | Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan |
title_short | Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications |
title_sort | sustainable security practices using blockchain quantum and post quantum technologies for real time applications |
topic | Sustainability Mobile and Network Security Blockchain Data Structures and Information Theory Security Services Cryptology Computer networks / Security measures Blockchains (Databases) Data structures (Computer science) Information theory Data protection Cryptography Data encryption (Computer science) |
topic_facet | Sustainability Mobile and Network Security Blockchain Data Structures and Information Theory Security Services Cryptology Computer networks / Security measures Blockchains (Databases) Data structures (Computer science) Information theory Data protection Cryptography Data encryption (Computer science) |
url | https://doi.org/10.1007/978-981-97-0088-2 |
work_keys_str_mv | AT kumaradarsh sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications AT ahujaneelujyothi sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications AT kaushikkeshav sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications AT tomardeepaksingh sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications AT khansurbhibhatia sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications |