Показать сокращенную информацию
dc.contributor.author | Kumar Neeraj | |
dc.contributor.author | Agrawal Alka | |
dc.contributor.author | Chaurasia Brijesh Kumar | |
dc.contributor.author | Khan R. A. | |
dc.date.accessioned | 2024-01-29T22:22:08Z | |
dc.date.available | 2024-01-29T22:22:08Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Limitations and future applications of quantum cryptography Advances in information security, privacy, and ethics (AISPE) book series. - 1 online resource (xxvii, 305 pages) : - URL: https://libweb.kpfu.ru/ebsco/pdf/2751433.pdf | |
dc.identifier.isbn | 1799866793 | |
dc.identifier.isbn | 9781799866794 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/180613 | |
dc.description | "Premier Reference Source"--Taken from front cover | |
dc.description | Includes bibliographical references and index. | |
dc.description.abstract | "This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"-- | |
dc.description.tableofcontents | VLSI architecture of substitution box / Abhishek Kumar, Suman Tripathi -- Fundamentals of quantum computing, quantum supremacy and quantum machine learning / Kamaljit Lakhtaria, Vrunda Gadesha -- Quantum security for IoT to secure healthcare applications and it's data / Binod Kumar, Sheetal Prasad -- Data hiding in color image using steganography and cryptography to support message privacy / Sabyasachi Pramanik, Ramkrishna Ghosh, Sneh Kalra, Jayeeta Majumder, Digvijay Pandey, Souvik Pal -- Quantum computing : concept, applications and need of law for its enforcement / Neeraj Kumar, Alka Agrawal -- Quantum algorithms with applications to cryptography : quantum algorithms / Renata Wong, Amandeep Bhatia -- Implications on quantum cryptography : cryptography / Varsha Sahni, Neeraj Kumar, Sujatha Krishnamoorthy -- A contemporary study on quantum-computing security mechanisms in 5G networks / Rydhm Beri -- Define security and privacy using quantum internet / Nilay Mistry, Ankit Dholakiya, Jay Prajapati -- Quantum and visual crypto biometric based secured authentication system transactions, server and locker system in cloud / Nandini C., Jahnavi S. -- The role of quantum computing in software forensics & digital evidence : issues and challenges / Sandeep Sharma, Mazhar Khaliq -- Recent progress in quantum machine learning / Amandeep Bhatia, Renata Wong -- Advances of quantum machine learning / Bhanu Chander -- Image processing using quantum computing : a review / Bably Dolly, Deepa Raj -- Quantum cryptography for securing IoT based healthcare system / Anand Sharma -- Function optimization using IBM Q / Soumyajit Goswami. | |
dc.language | English | |
dc.language.iso | en | |
dc.relation.ispartofseries | Advances in information security, privacy, and ethics (AISPE) book series | |
dc.relation.ispartofseries | Advances in information security, privacy, and ethics (AISPE) book series. | |
dc.subject.other | Quantum computing. | |
dc.subject.other | Cryptography. | |
dc.subject.other | Data encryption (Computer science) | |
dc.subject.other | Internet of things. | |
dc.subject.other | Cryptography | |
dc.subject.other | Data encryption (Computer science) | |
dc.subject.other | Internet of things | |
dc.subject.other | Quantum computing | |
dc.subject.other | Electronic books. | |
dc.title | Limitations and future applications of quantum cryptography Advances in information security, privacy, and ethics (AISPE) book series./ Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan. | |
dc.type | Book | |
dc.description.pages | 1 online resource (xxvii, 305 pages) : | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C1776 |