Limitations and future applications of quantum cryptography:
"This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as ava...
Saved in:
Other Authors: | , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
[2021]
|
Subjects: | |
Online Access: | DE-862 DE-863 |
Summary: | "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"-- |
Physical Description: | 20 PDFs (305 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliography: | Includes bibliographical references and index. |
ISBN: | 9781799866794 |
Access: | Restricted to subscribers or individual electronic text purchasers. |
Staff View
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00256632 | ||
003 | IGIG | ||
005 | 20210210204122.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 210211s2021 pau fob 001 0 eng d | ||
010 | |z 2020026780 | ||
020 | |a 9781799866794 |q ebook | ||
020 | |z 1799866793 | ||
020 | |z 9781799866770 |q hardcover | ||
020 | |z 9781799866787 |q paperback | ||
024 | 7 | |a 10.4018/978-1-7998-6677-0 |2 doi | |
035 | |a (CaBNVSL)slc00001104 | ||
035 | |a (OCoLC)1237530864 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.889 |b .L56 2021e | |
082 | 7 | |a 004.67/8 |2 23 | |
245 | 0 | 0 | |a Limitations and future applications of quantum cryptography |c Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c [2021] | |
300 | |a 20 PDFs (305 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | 0 | |a Description based on title screen (IGI Global, viewed 02/11/2021). | |
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Internet of things. | |
650 | 0 | |a Quantum computing. | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Internet of things |2 fast | |
650 | 7 | |a Quantum computing |2 fast | |
653 | |a 5G Networks. | ||
653 | |a Biometrics. | ||
653 | |a Cryptography. | ||
653 | |a Data Protection. | ||
653 | |a Image Processing. | ||
653 | |a Internet of Things. | ||
653 | |a Privacy. | ||
653 | |a Quantum Algorithms. | ||
653 | |a Quantum Computing. | ||
653 | |a Quantum Cyber Security. | ||
653 | |a Quantum machine learning. | ||
653 | |a Steganography. | ||
700 | 1 | |a Agrawal, Alka |d 1977- |e editor. | |
700 | 1 | |a Chaurasia, Brijesh Kumar |d 1975- |e editor. | |
700 | 1 | |a Khan, R. A. |q (Raees Ahmad) |e editor. | |
700 | 1 | |a Kumar, Neeraj |d 1981- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2020026780 | |
776 | 0 | 8 | |i Print version: |z 1799866777 |z 9781799866770 |w (DLC) 2020026780 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Record in the Search Index
DE-BY-FWS_katkey | ZDB-98-IGB-00256632 |
---|---|
_version_ | 1826942599380860928 |
adam_text | |
any_adam_object | |
author2 | Agrawal, Alka 1977- Chaurasia, Brijesh Kumar 1975- Khan, R. A. (Raees Ahmad) Kumar, Neeraj 1981- |
author2_role | edt edt edt edt |
author2_variant | a a aa b k c bk bkc r a k ra rak n k nk |
author_facet | Agrawal, Alka 1977- Chaurasia, Brijesh Kumar 1975- Khan, R. A. (Raees Ahmad) Kumar, Neeraj 1981- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.889 .L56 2021e |
callnumber-search | QA76.889 .L56 2021e |
callnumber-sort | QA 276.889 L56 42021E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning. |
ctrlnum | (CaBNVSL)slc00001104 (OCoLC)1237530864 |
dewey-full | 004.67/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/8 |
dewey-search | 004.67/8 |
dewey-sort | 14.67 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03948nam a2200721 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00256632</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20210210204122.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">210211s2021 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2020026780</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799866794</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1799866793</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799866770</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799866787</subfield><subfield code="q">paperback</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-6677-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00001104</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1237530864</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.889</subfield><subfield code="b">.L56 2021e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.67/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Limitations and future applications of quantum cryptography </subfield><subfield code="c">Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">20 PDFs (305 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 02/11/2021).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Quantum computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of things</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Quantum computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">5G Networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Biometrics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Protection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Image Processing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet of Things.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Privacy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Quantum Algorithms.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Quantum Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Quantum Cyber Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Quantum machine learning.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Steganography.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agrawal, Alka</subfield><subfield code="d">1977-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaurasia, Brijesh Kumar</subfield><subfield code="d">1975-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, R. A.</subfield><subfield code="q">(Raees Ahmad)</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Neeraj</subfield><subfield code="d">1981-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2020026780</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799866777</subfield><subfield code="z">9781799866770</subfield><subfield code="w">(DLC) 2020026780</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00256632 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:34Z |
institution | BVB |
isbn | 9781799866794 |
language | English |
oclc_num | 1237530864 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 20 PDFs (305 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IGI Global |
record_format | marc |
spelling | Limitations and future applications of quantum cryptography Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global [2021] 20 PDFs (305 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning. Restricted to subscribers or individual electronic text purchasers. "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 02/11/2021). Cryptography. Data encryption (Computer science) Internet of things. Quantum computing. Cryptography fast Data encryption (Computer science) fast Internet of things fast Quantum computing fast 5G Networks. Biometrics. Data Protection. Image Processing. Internet of Things. Privacy. Quantum Algorithms. Quantum Computing. Quantum Cyber Security. Quantum machine learning. Steganography. Agrawal, Alka 1977- editor. Chaurasia, Brijesh Kumar 1975- editor. Khan, R. A. (Raees Ahmad) editor. Kumar, Neeraj 1981- editor. IGI Global, publisher. (Original) (DLC)2020026780 Print version: 1799866777 9781799866770 (DLC) 2020026780 |
spellingShingle | Limitations and future applications of quantum cryptography Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning. Cryptography. Data encryption (Computer science) Internet of things. Quantum computing. Cryptography fast Data encryption (Computer science) fast Internet of things fast Quantum computing fast |
title | Limitations and future applications of quantum cryptography |
title_auth | Limitations and future applications of quantum cryptography |
title_exact_search | Limitations and future applications of quantum cryptography |
title_full | Limitations and future applications of quantum cryptography Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. |
title_fullStr | Limitations and future applications of quantum cryptography Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. |
title_full_unstemmed | Limitations and future applications of quantum cryptography Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. |
title_short | Limitations and future applications of quantum cryptography |
title_sort | limitations and future applications of quantum cryptography |
topic | Cryptography. Data encryption (Computer science) Internet of things. Quantum computing. Cryptography fast Data encryption (Computer science) fast Internet of things fast Quantum computing fast |
topic_facet | Cryptography. Data encryption (Computer science) Internet of things. Quantum computing. Cryptography Internet of things Quantum computing |
work_keys_str_mv | AT agrawalalka limitationsandfutureapplicationsofquantumcryptography AT chaurasiabrijeshkumar limitationsandfutureapplicationsofquantumcryptography AT khanra limitationsandfutureapplicationsofquantumcryptography AT kumarneeraj limitationsandfutureapplicationsofquantumcryptography AT igiglobal limitationsandfutureapplicationsofquantumcryptography |