Limitations and future applications of quantum cryptography:
"This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as ava...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2021]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"-- |
Beschreibung: | 20 PDFs (305 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781799866794 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00256632 | ||
003 | IGIG | ||
005 | 20210210204122.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 210211s2021 pau fob 001 0 eng d | ||
010 | |z 2020026780 | ||
020 | |a 9781799866794 |q ebook | ||
020 | |z 1799866793 | ||
020 | |z 9781799866770 |q hardcover | ||
020 | |z 9781799866787 |q paperback | ||
024 | 7 | |a 10.4018/978-1-7998-6677-0 |2 doi | |
035 | |a (CaBNVSL)slc00001104 | ||
035 | |a (OCoLC)1237530864 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.889 |b .L56 2021e | |
082 | 7 | |a 004.67/8 |2 23 | |
245 | 0 | 0 | |a Limitations and future applications of quantum cryptography |c Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2021] | |
300 | |a 20 PDFs (305 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 02/11/2021). | ||
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Internet of things. | |
650 | 0 | |a Quantum computing. | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Internet of things |2 fast | |
650 | 7 | |a Quantum computing |2 fast | |
700 | 1 | |a Agrawal, Alka |d 1977- |e editor. | |
700 | 1 | |a Chaurasia, Brijesh Kumar |d 1975- |e editor. | |
700 | 1 | |a Khan, R. A. |q (Raees Ahmad), |e editor. | |
700 | 1 | |a Kumar, Neeraj |d 1981- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2020026780 | |
776 | 0 | 8 | |i Print version: |z 1799866777 |z 9781799866770 |w (DLC) 2020026780 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00256632 |
---|---|
_version_ | 1816797084795273216 |
adam_text | |
any_adam_object | |
author2 | Agrawal, Alka 1977- Chaurasia, Brijesh Kumar 1975- Khan, R. A. (Raees Ahmad) Kumar, Neeraj 1981- |
author2_role | edt edt edt edt |
author2_variant | a a aa b k c bk bkc r a k ra rak n k nk |
author_facet | Agrawal, Alka 1977- Chaurasia, Brijesh Kumar 1975- Khan, R. A. (Raees Ahmad) Kumar, Neeraj 1981- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.889 .L56 2021e |
callnumber-search | QA76.889 .L56 2021e |
callnumber-sort | QA 276.889 L56 42021E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning. |
ctrlnum | (CaBNVSL)slc00001104 (OCoLC)1237530864 |
dewey-full | 004.67/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/8 |
dewey-search | 004.67/8 |
dewey-sort | 14.67 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03551nam a2200577 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00256632</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20210210204122.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">210211s2021 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2020026780</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799866794</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1799866793</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799866770</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799866787</subfield><subfield code="q">paperback</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-6677-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00001104</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1237530864</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.889</subfield><subfield code="b">.L56 2021e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.67/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Limitations and future applications of quantum cryptography </subfield><subfield code="c">Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">20 PDFs (305 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 02/11/2021).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Quantum computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of things</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Quantum computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agrawal, Alka</subfield><subfield code="d">1977-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaurasia, Brijesh Kumar</subfield><subfield code="d">1975-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, R. A.</subfield><subfield code="q">(Raees Ahmad),</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Neeraj</subfield><subfield code="d">1981-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2020026780</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799866777</subfield><subfield code="z">9781799866770</subfield><subfield code="w">(DLC) 2020026780</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00256632 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:57Z |
institution | BVB |
isbn | 9781799866794 |
language | English |
oclc_num | 1237530864 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 20 PDFs (305 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IGI Global, |
record_format | marc |
spelling | Limitations and future applications of quantum cryptography Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2021] 20 PDFs (305 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning. Restricted to subscribers or individual electronic text purchasers. "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 02/11/2021). Cryptography. Data encryption (Computer science) Internet of things. Quantum computing. Cryptography fast Data encryption (Computer science) fast Internet of things fast Quantum computing fast Agrawal, Alka 1977- editor. Chaurasia, Brijesh Kumar 1975- editor. Khan, R. A. (Raees Ahmad), editor. Kumar, Neeraj 1981- editor. IGI Global, publisher. (Original) (DLC)2020026780 Print version: 1799866777 9781799866770 (DLC) 2020026780 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 Volltext |
spellingShingle | Limitations and future applications of quantum cryptography Chapter 1. Quantum cryptography: basic principles and methodology -- Chapter 2. Fundamentals of quantum computing, quantum supremacy, and quantum machine learning -- Chapter 3. Quantum cryptography: in security aspects -- Chapter 4. Security and privacy aspects using quantum Internet -- Chapter 5. Quantum algorithms: application perspective -- Chapter 6. Post-quantum lattice-based cryptography: a quantum-resistant cryptosystem -- Chapter 7. Quantum cryptography for securing IoT-based healthcare systems -- Chapter 8. Quantum security for IoT to secure healthcare applications and their data -- Chapter 9. The role of quantum computing in software forensics and digital evidence: issues and challenges -- Chapter 10. Image processing using quantum computing: trends and challenges -- Chapter 11. Data hiding in color image using steganography and cryptography to support message privacy -- Chapter 12. Recent progress in quantum machine learning -- Chapter 13. Advances of quantum machine learning. Cryptography. Data encryption (Computer science) Internet of things. Quantum computing. Cryptography fast Data encryption (Computer science) fast Internet of things fast Quantum computing fast |
title | Limitations and future applications of quantum cryptography |
title_auth | Limitations and future applications of quantum cryptography |
title_exact_search | Limitations and future applications of quantum cryptography |
title_full | Limitations and future applications of quantum cryptography Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. |
title_fullStr | Limitations and future applications of quantum cryptography Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. |
title_full_unstemmed | Limitations and future applications of quantum cryptography Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees Ahmad Khan, editor. |
title_short | Limitations and future applications of quantum cryptography |
title_sort | limitations and future applications of quantum cryptography |
topic | Cryptography. Data encryption (Computer science) Internet of things. Quantum computing. Cryptography fast Data encryption (Computer science) fast Internet of things fast Quantum computing fast |
topic_facet | Cryptography. Data encryption (Computer science) Internet of things. Quantum computing. Cryptography Internet of things Quantum computing |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |
work_keys_str_mv | AT agrawalalka limitationsandfutureapplicationsofquantumcryptography AT chaurasiabrijeshkumar limitationsandfutureapplicationsofquantumcryptography AT khanra limitationsandfutureapplicationsofquantumcryptography AT kumarneeraj limitationsandfutureapplicationsofquantumcryptography AT igiglobal limitationsandfutureapplicationsofquantumcryptography |