Quantum cryptography and the future of cyber security:
"This book explores the latest applications and advancements of quantum cryptography and cyber security"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2020]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores the latest applications and advancements of quantum cryptography and cyber security"-- |
Beschreibung: | "Premier Reference Source" -- Cover. |
Beschreibung: | 26 PDFs (343 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1799822559 9781799822554 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00235722 | ||
003 | IGIG | ||
005 | 20200214155827.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 200215s2020 pau fob 001 0 eng d | ||
010 | |z 2019037763 | ||
020 | |a 1799822559 |q electronic book | ||
020 | |a 9781799822554 |q electronic book | ||
020 | |z 9781799822530 |q hardcover | ||
020 | |z 9781799822547 |q paperback | ||
024 | 7 | |a 10.4018/978-1-7998-2253-0 |2 doi | |
035 | |a (CaBNVSL)slc00000290 | ||
035 | |a (OCoLC)1135090300 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5103.592.Q83 |b Q38 2020e | |
082 | 7 | |a 005.8/24 |2 23 | |
245 | 0 | 0 | |a Quantum cryptography and the future of cyber security |c [edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2020] | |
300 | |a 26 PDFs (343 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
500 | |a "Premier Reference Source" -- Cover. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. Quantum cryptography. Chapter 1. Post-quantum cryptography and quantum cloning ; Chapter 2. Quantum key distribution: the evolution ; Chapter 3. Optimal parameter prediction for secure quantum key distribution using quantum machine learning models ; Chapter 4. LFSR-keyed MUX for random number generation in nano communication using QCA ; Chapter 5. Quantum cryptography key distribution: quantum computing ; Chapter 6. Quantum Internet and e-governance: a futuristic perspective -- Section 2. Cyber security. Chapter 7. Critical infrastructure security: cyber-physical attack prevention, detection, and countermeasures ; Chapter 8. Cryptography in the healthcare sector with modernized cyber security ; Chapter 9. Improved methodology to detect advanced persistent threat attacks ; Chapter 10. IoT and cyber security: introduction, attacks, and preventive steps ; Chapter 11. Security and privacy in big data computing: concepts, techniques, and research challenges ; Chapter 12. Cyber security techniques for internet of things (IoT) ; Chapter 13. Cyber security aspects of virtualization in cloud computing environments: analyzing virtualization-specific cyber security risks. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores the latest applications and advancements of quantum cryptography and cyber security"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 02/15/2020). | ||
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Quantum communication |x Security measures. | |
650 | 7 | |a Cryptography. |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
700 | 1 | |a Chaubey, Nirbhay Kumar |d 1971- |e editor. | |
700 | 1 | |a Prajapati, Bhavesh B. |d 1975- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019037763 | |
776 | 0 | 8 | |i Print version: |z 1799822532 |z 9781799822530 |w (DLC) 2019037763 |
830 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series. | |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2253-0 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00235722 |
---|---|
_version_ | 1816797083068268544 |
adam_text | |
any_adam_object | |
author2 | Chaubey, Nirbhay Kumar 1971- Prajapati, Bhavesh B. 1975- |
author2_role | edt edt |
author2_variant | n k c nk nkc b b p bb bbp |
author_facet | Chaubey, Nirbhay Kumar 1971- Prajapati, Bhavesh B. 1975- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.592.Q83 Q38 2020e |
callnumber-search | TK5103.592.Q83 Q38 2020e |
callnumber-sort | TK 45103.592 Q83 Q38 42020E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Section 1. Quantum cryptography. Chapter 1. Post-quantum cryptography and quantum cloning ; Chapter 2. Quantum key distribution: the evolution ; Chapter 3. Optimal parameter prediction for secure quantum key distribution using quantum machine learning models ; Chapter 4. LFSR-keyed MUX for random number generation in nano communication using QCA ; Chapter 5. Quantum cryptography key distribution: quantum computing ; Chapter 6. Quantum Internet and e-governance: a futuristic perspective -- Section 2. Cyber security. Chapter 7. Critical infrastructure security: cyber-physical attack prevention, detection, and countermeasures ; Chapter 8. Cryptography in the healthcare sector with modernized cyber security ; Chapter 9. Improved methodology to detect advanced persistent threat attacks ; Chapter 10. IoT and cyber security: introduction, attacks, and preventive steps ; Chapter 11. Security and privacy in big data computing: concepts, techniques, and research challenges ; Chapter 12. Cyber security techniques for internet of things (IoT) ; Chapter 13. Cyber security aspects of virtualization in cloud computing environments: analyzing virtualization-specific cyber security risks. |
ctrlnum | (CaBNVSL)slc00000290 (OCoLC)1135090300 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03559nam a2200553 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00235722</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20200214155827.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">200215s2020 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019037763</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799822559</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799822554</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799822530</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799822547</subfield><subfield code="q">paperback</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-2253-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00000290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1135090300</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5103.592.Q83</subfield><subfield code="b">Q38 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Quantum cryptography and the future of cyber security </subfield><subfield code="c">[edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">26 PDFs (343 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Premier Reference Source" -- Cover.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Quantum cryptography. Chapter 1. Post-quantum cryptography and quantum cloning ; Chapter 2. Quantum key distribution: the evolution ; Chapter 3. Optimal parameter prediction for secure quantum key distribution using quantum machine learning models ; Chapter 4. LFSR-keyed MUX for random number generation in nano communication using QCA ; Chapter 5. Quantum cryptography key distribution: quantum computing ; Chapter 6. Quantum Internet and e-governance: a futuristic perspective -- Section 2. Cyber security. Chapter 7. Critical infrastructure security: cyber-physical attack prevention, detection, and countermeasures ; Chapter 8. Cryptography in the healthcare sector with modernized cyber security ; Chapter 9. Improved methodology to detect advanced persistent threat attacks ; Chapter 10. IoT and cyber security: introduction, attacks, and preventive steps ; Chapter 11. Security and privacy in big data computing: concepts, techniques, and research challenges ; Chapter 12. Cyber security techniques for internet of things (IoT) ; Chapter 13. Cyber security aspects of virtualization in cloud computing environments: analyzing virtualization-specific cyber security risks.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores the latest applications and advancements of quantum cryptography and cyber security"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 02/15/2020).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Quantum communication</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaubey, Nirbhay Kumar</subfield><subfield code="d">1971-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prajapati, Bhavesh B.</subfield><subfield code="d">1975-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019037763</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799822532</subfield><subfield code="z">9781799822530</subfield><subfield code="w">(DLC) 2019037763</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2253-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00235722 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:56Z |
institution | BVB |
isbn | 1799822559 9781799822554 |
language | English |
oclc_num | 1135090300 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 26 PDFs (343 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global, |
record_format | marc |
series | Advances in information security, privacy, and ethics (AISPE) book series. |
series2 | Advances in information security, privacy, and ethics (AISPE) book series |
spelling | Quantum cryptography and the future of cyber security [edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2020] 26 PDFs (343 pages) text rdacontent electronic isbdmedia online resource rdacarrier Advances in information security, privacy, and ethics (AISPE) book series "Premier Reference Source" -- Cover. Includes bibliographical references and index. Section 1. Quantum cryptography. Chapter 1. Post-quantum cryptography and quantum cloning ; Chapter 2. Quantum key distribution: the evolution ; Chapter 3. Optimal parameter prediction for secure quantum key distribution using quantum machine learning models ; Chapter 4. LFSR-keyed MUX for random number generation in nano communication using QCA ; Chapter 5. Quantum cryptography key distribution: quantum computing ; Chapter 6. Quantum Internet and e-governance: a futuristic perspective -- Section 2. Cyber security. Chapter 7. Critical infrastructure security: cyber-physical attack prevention, detection, and countermeasures ; Chapter 8. Cryptography in the healthcare sector with modernized cyber security ; Chapter 9. Improved methodology to detect advanced persistent threat attacks ; Chapter 10. IoT and cyber security: introduction, attacks, and preventive steps ; Chapter 11. Security and privacy in big data computing: concepts, techniques, and research challenges ; Chapter 12. Cyber security techniques for internet of things (IoT) ; Chapter 13. Cyber security aspects of virtualization in cloud computing environments: analyzing virtualization-specific cyber security risks. Restricted to subscribers or individual electronic text purchasers. "This book explores the latest applications and advancements of quantum cryptography and cyber security"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 02/15/2020). Cryptography. Data encryption (Computer science) Quantum communication Security measures. Cryptography. fast Data encryption (Computer science) fast Chaubey, Nirbhay Kumar 1971- editor. Prajapati, Bhavesh B. 1975- editor. IGI Global, publisher. (Original) (DLC)2019037763 Print version: 1799822532 9781799822530 (DLC) 2019037763 Advances in information security, privacy, and ethics (AISPE) book series. FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2253-0 Volltext |
spellingShingle | Quantum cryptography and the future of cyber security Advances in information security, privacy, and ethics (AISPE) book series. Section 1. Quantum cryptography. Chapter 1. Post-quantum cryptography and quantum cloning ; Chapter 2. Quantum key distribution: the evolution ; Chapter 3. Optimal parameter prediction for secure quantum key distribution using quantum machine learning models ; Chapter 4. LFSR-keyed MUX for random number generation in nano communication using QCA ; Chapter 5. Quantum cryptography key distribution: quantum computing ; Chapter 6. Quantum Internet and e-governance: a futuristic perspective -- Section 2. Cyber security. Chapter 7. Critical infrastructure security: cyber-physical attack prevention, detection, and countermeasures ; Chapter 8. Cryptography in the healthcare sector with modernized cyber security ; Chapter 9. Improved methodology to detect advanced persistent threat attacks ; Chapter 10. IoT and cyber security: introduction, attacks, and preventive steps ; Chapter 11. Security and privacy in big data computing: concepts, techniques, and research challenges ; Chapter 12. Cyber security techniques for internet of things (IoT) ; Chapter 13. Cyber security aspects of virtualization in cloud computing environments: analyzing virtualization-specific cyber security risks. Cryptography. Data encryption (Computer science) Quantum communication Security measures. Cryptography. fast Data encryption (Computer science) fast |
title | Quantum cryptography and the future of cyber security |
title_auth | Quantum cryptography and the future of cyber security |
title_exact_search | Quantum cryptography and the future of cyber security |
title_full | Quantum cryptography and the future of cyber security [edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati. |
title_fullStr | Quantum cryptography and the future of cyber security [edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati. |
title_full_unstemmed | Quantum cryptography and the future of cyber security [edited by] Nirbhay Kumar Chaubey, Bhavesh B. Prajapati. |
title_short | Quantum cryptography and the future of cyber security |
title_sort | quantum cryptography and the future of cyber security |
topic | Cryptography. Data encryption (Computer science) Quantum communication Security measures. Cryptography. fast Data encryption (Computer science) fast |
topic_facet | Cryptography. Data encryption (Computer science) Quantum communication Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2253-0 |
work_keys_str_mv | AT chaubeynirbhaykumar quantumcryptographyandthefutureofcybersecurity AT prajapatibhaveshb quantumcryptographyandthefutureofcybersecurity AT igiglobal quantumcryptographyandthefutureofcybersecurity |