dc.contributor.author |
Kumar Neeraj |
|
dc.contributor.author |
Agrawal Alka |
|
dc.contributor.author |
Chaurasia Brijesh Kumar |
|
dc.contributor.author |
Khan R. A. |
|
dc.date.accessioned |
2024-01-29T22:22:08Z |
|
dc.date.available |
2024-01-29T22:22:08Z |
|
dc.date.issued |
2021 |
|
dc.identifier.citation |
Limitations and future applications of quantum cryptography
Advances in information security, privacy, and ethics (AISPE) book series. - 1 online resource (xxvii, 305 pages) : - URL: https://libweb.kpfu.ru/ebsco/pdf/2751433.pdf |
|
dc.identifier.isbn |
1799866793 |
|
dc.identifier.isbn |
9781799866794 |
|
dc.identifier.uri |
https://dspace.kpfu.ru/xmlui/handle/net/180613 |
|
dc.description |
"Premier Reference Source"--Taken from front cover |
|
dc.description |
Includes bibliographical references and index. |
|
dc.description.abstract |
"This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"-- |
|
dc.description.tableofcontents |
VLSI architecture of substitution box / Abhishek Kumar, Suman Tripathi -- Fundamentals of quantum computing, quantum supremacy and quantum machine learning / Kamaljit Lakhtaria, Vrunda Gadesha -- Quantum security for IoT to secure healthcare applications and it's data / Binod Kumar, Sheetal Prasad -- Data hiding in color image using steganography and cryptography to support message privacy / Sabyasachi Pramanik, Ramkrishna Ghosh, Sneh Kalra, Jayeeta Majumder, Digvijay Pandey, Souvik Pal -- Quantum computing : concept, applications and need of law for its enforcement / Neeraj Kumar, Alka Agrawal -- Quantum algorithms with applications to cryptography : quantum algorithms / Renata Wong, Amandeep Bhatia -- Implications on quantum cryptography : cryptography / Varsha Sahni, Neeraj Kumar, Sujatha Krishnamoorthy -- A contemporary study on quantum-computing security mechanisms in 5G networks / Rydhm Beri -- Define security and privacy using quantum internet / Nilay Mistry, Ankit Dholakiya, Jay Prajapati -- Quantum and visual crypto biometric based secured authentication system transactions, server and locker system in cloud / Nandini C., Jahnavi S. -- The role of quantum computing in software forensics & digital evidence : issues and challenges / Sandeep Sharma, Mazhar Khaliq -- Recent progress in quantum machine learning / Amandeep Bhatia, Renata Wong -- Advances of quantum machine learning / Bhanu Chander -- Image processing using quantum computing : a review / Bably Dolly, Deepa Raj -- Quantum cryptography for securing IoT based healthcare system / Anand Sharma -- Function optimization using IBM Q / Soumyajit Goswami. |
|
dc.language |
English |
|
dc.language.iso |
en |
|
dc.relation.ispartofseries |
Advances in information security, privacy, and ethics (AISPE) book series |
|
dc.relation.ispartofseries |
Advances in information security, privacy, and ethics (AISPE) book series. |
|
dc.subject.other |
Quantum computing. |
|
dc.subject.other |
Cryptography. |
|
dc.subject.other |
Data encryption (Computer science) |
|
dc.subject.other |
Internet of things. |
|
dc.subject.other |
Cryptography |
|
dc.subject.other |
Data encryption (Computer science) |
|
dc.subject.other |
Internet of things |
|
dc.subject.other |
Quantum computing |
|
dc.subject.other |
Electronic books. |
|
dc.title |
Limitations and future applications of quantum cryptography
Advances in information security, privacy, and ethics (AISPE) book series./ Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan. |
|
dc.type |
Book |
|
dc.description.pages |
1 online resource (xxvii, 305 pages) : |
|
dc.collection |
Электронно-библиотечные системы |
|
dc.source.id |
EN05CEBSCO05C1776 |
|