Holistic Approach to Quantum Cryptography in Cyber Security / edited Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh.
Material type:
- 005.8/24 23/eng/20220419
- QA76.9 .D335 B575 2023
Item type | Current library | Collection | Call number | Copy number | Status | Notes | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
Rabdan Academy General Stacks | General Collection | QA76.9 .D335 B575 2023 (Browse shelf(Opens below)) | C. 2 | Available | AED 389.55 | 22405 | |
![]() |
Rabdan Academy General Stacks | General Collection | QA76.9 .D335 B575 2023 (Browse shelf(Opens below)) | C. 1 | Available | AED 405.00 | 21915 | |
![]() |
Zayed Military University General Stacks | General Collection | QA76.9 .D335 B575 2023 (Browse shelf(Opens below)) | C. 3 | Available | AED 389.55 | 22406 |
Browsing Rabdan Academy shelves,Shelving location: General Stacks,Collection: General Collection Close shelf browser (Hides shelf browser)
![]() |
No cover image available |
![]() |
No cover image available | No cover image available |
![]() |
![]() |
||
QA76.9 .D26 R375 2022 Fundamentals of Data Engineering : plan and build robust data systems / | QA76.9 .D3 G671 2022 Practical Entity Framework Core 6 : database access for enterprise applications / | QA76.9 .D3 W862 2001 Data Engineering : fuzzy mathematics in systems theory and data analysis / | QA76.9 .D335 B575 2023 Holistic Approach to Quantum Cryptography in Cyber Security / | QA76.9 .D335 B575 2023 Holistic Approach to Quantum Cryptography in Cyber Security / | QA76.9 .D343 M396 2014 Big Data | QA76.9 .H945 2023 The Art of Prompt Engineering with ChatGPT : a hands on guide - 5 chapters on GPTs / |
Includes bibliographical references and index.
"This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques architectures and design, cyber security techniques management, software defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology"--
There are no comments on this title.