Holistic Approach to Quantum Cryptography in Cyber Security / edited Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh.
Material type:
TextPublication details: Boca Raton: CRC Press, 2023.Edition: First edition published 2023Description: 243 pages; 24 cmSubject(s): Additional physical formats: Print version:: Holistic approach to quantum cryptography in cyber securityDDC classification: - 005.8/24 23/eng/20220419
- QA76.9 .D335 B575 2023
| Item type | Current library | Collection | Call number | Copy number | Status | Notes | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Rabdan Academy General Stacks | General Collection | QA76.9 .D335 B575 2023 (Browse shelf(Opens below)) | C. 2 | Available | AED 389.55 | 22405 | |
Books
|
Rabdan Academy General Stacks | General Collection | QA76.9 .D335 B575 2023 (Browse shelf(Opens below)) | C. 1 | Available | AED 405.00 | 21915 | |
Books
|
Zayed Military University General Stacks | General Collection | QA76.9 .D335 B575 2023 (Browse shelf(Opens below)) | C. 3 | Available | AED 389.55 | 22406 |
Browsing Zayed Military University shelves,Shelving location: General Stacks,Collection: General Collection Close shelf browser (Hides shelf browser)
|
|
|
No cover image available |
|
|
|
||
| QA76.9 .B45 O64 2017 Weapons of Math Destruction : how big data increases inequality and threatens democracy / | QA76.9 .B56 K35 2022 الذكاء الاصطناعي والبلوك تشين : كيف ينبغي تنظيم التقنيات الناشئة؟ / | QA76.9 .B56 K35 2022 الذكاء الاصطناعي والبلوك تشين : كيف ينبغي تنظيم التقنيات الناشئة؟ / | QA76.9 .D335 B575 2023 Holistic Approach to Quantum Cryptography in Cyber Security / | QA76.9 .D343 R654 2015 Data Mining With Decision Trees: theory and applications / | QA76.9 .D348 T653 2003 Disaster recovery planning : preparing for the unthinkable / | QA76.9 .M689 2015 Modeling and Simulation in the Systems Engineering Life Cycle : core concepts and accompanying lectures / |
Includes bibliographical references and index.
"This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques architectures and design, cyber security techniques management, software defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology"--
There are no comments on this title.