Limitations and future applications of quantum cryptography:
Gespeichert in:
Weitere beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Publisher of Timely Knowledge
[2021]
|
Schriftenreihe: | A volume in the Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagwörter: | |
Links: | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 https://www.igi-global.com/gateway/book/256632 https://www.igi-global.com/gateway/book/256632 https://www.igi-global.com/gateway/book/256632 https://doi.org/10.4018/978-1-7998-6677-0 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 https://doi.org/10.4018/978-1-7998-6677-0 https://www.igi-global.com/gateway/book/256632 |
Abstract: | The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing |
Umfang: | 1 Online-Ressource (xxvii, 305 Seiten) Illustrationen |
ISBN: | 1799866793 9781799866794 |
ISSN: | 1948-9749 |
DOI: | 10.4018/978-1-7998-6677-0 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047243909 | ||
003 | DE-604 | ||
005 | 20220331 | ||
007 | cr|uuu---uuuuu | ||
008 | 210419s2021 xx a||| o|||| 00||| eng d | ||
020 | |a 1799866793 |9 1-7998-6679-3 | ||
020 | |a 9781799866794 |c Online |9 978-1-7998-6679-4 | ||
024 | 7 | |a 10.4018/978-1-7998-6677-0 |2 doi | |
035 | |a (ZDB-98-IGB)978-1-7998-6679-4 | ||
035 | |a (OCoLC)1249671644 | ||
035 | |a (DE-599)HEB476936659 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1049 |a DE-91 |a DE-706 |a DE-898 |a DE-1050 |a DE-573 |a DE-83 | ||
245 | 1 | 0 | |a Limitations and future applications of quantum cryptography |c Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India) |
264 | 1 | |a Hershey PA, USA |b IGI Global, Publisher of Timely Knowledge |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a 1 Online-Ressource (xxvii, 305 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a A volume in the Advances in information security, privacy, and ethics (AISPE) book series |x 1948-9749 | |
490 | 0 | |a Premier reference source | |
520 | 3 | |a The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Aggarwal, Neeraj K. |d 1973- |0 (DE-588)1159410909 |4 edt | |
700 | 1 | |a Agrawal, Alka |0 (DE-588)170845575 |4 edt | |
700 | 1 | |a Chaurasia, Brijesh K. |4 edt | |
700 | 1 | |a Khan, Raees Ahmad |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-7998-6677-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-7998-6677-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Softcover |z 978-1-7998-6678-7 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-6677-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 0 | |u https://www.igi-global.com/gateway/book/256632 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
912 | |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032648116 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/256632 |l DE-898 |p ZDB-1-IGE |q ZDB-1-IGE21 |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/256632 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE21 |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/256632 |l DE-91 |p ZDB-1-IGE |q TUM_Lizenz |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-6677-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2555393 |
---|---|
_version_ | 1821936157855842305 |
any_adam_object | |
author2 | Aggarwal, Neeraj K. 1973- Agrawal, Alka Chaurasia, Brijesh K. Khan, Raees Ahmad |
author2_role | edt edt edt edt |
author2_variant | n k a nk nka a a aa b k c bk bkc r a k ra rak |
author_GND | (DE-588)1159410909 (DE-588)170845575 |
author_facet | Aggarwal, Neeraj K. 1973- Agrawal, Alka Chaurasia, Brijesh K. Khan, Raees Ahmad |
building | Verbundindex |
bvnumber | BV047243909 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)978-1-7998-6679-4 (OCoLC)1249671644 (DE-599)HEB476936659 |
doi_str_mv | 10.4018/978-1-7998-6677-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04611nam a2200553 c 4500</leader><controlfield tag="001">BV047243909</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220331 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210419s2021 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799866793</subfield><subfield code="9">1-7998-6679-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799866794</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-7998-6679-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-6677-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-7998-6679-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1249671644</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HEB476936659</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Limitations and future applications of quantum cryptography</subfield><subfield code="c">Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Publisher of Timely Knowledge</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 305 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">A volume in the Advances in information security, privacy, and ethics (AISPE) book series</subfield><subfield code="x">1948-9749</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aggarwal, Neeraj K.</subfield><subfield code="d">1973-</subfield><subfield code="0">(DE-588)1159410909</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agrawal, Alka</subfield><subfield code="0">(DE-588)170845575</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaurasia, Brijesh K.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Raees Ahmad</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-7998-6677-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-7998-6677-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Softcover</subfield><subfield code="z">978-1-7998-6678-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-6677-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.igi-global.com/gateway/book/256632</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032648116</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/256632</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/256632</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/256632</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">TUM_Lizenz</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-6677-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-6677-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047243909 |
illustrated | Illustrated |
indexdate | 2024-12-20T19:13:53Z |
institution | BVB |
isbn | 1799866793 9781799866794 |
issn | 1948-9749 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032648116 |
oclc_num | 1249671644 |
open_access_boolean | |
owner | DE-1049 DE-91 DE-BY-TUM DE-706 DE-898 DE-BY-UBR DE-1050 DE-573 DE-83 |
owner_facet | DE-1049 DE-91 DE-BY-TUM DE-706 DE-898 DE-BY-UBR DE-1050 DE-573 DE-83 |
physical | 1 Online-Ressource (xxvii, 305 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-1-IGE ZDB-1-IGE21 ZDB-1-IGE TUM_Lizenz ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IGI Global, Publisher of Timely Knowledge |
record_format | marc |
series2 | A volume in the Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spellingShingle | Limitations and future applications of quantum cryptography |
subject_GND | (DE-588)4143413-4 |
title | Limitations and future applications of quantum cryptography |
title_auth | Limitations and future applications of quantum cryptography |
title_exact_search | Limitations and future applications of quantum cryptography |
title_full | Limitations and future applications of quantum cryptography Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India) |
title_fullStr | Limitations and future applications of quantum cryptography Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India) |
title_full_unstemmed | Limitations and future applications of quantum cryptography Neeraj Kumar (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Alka Agrawal (Babasaheb Bhimrao Ambedkar University, Lucknow, India), Brijesh K. Chaurasia (Indian Institute of Information Technology, India), Raees Ahmad Khan (Indian Institute of Information Technology, India) |
title_short | Limitations and future applications of quantum cryptography |
title_sort | limitations and future applications of quantum cryptography |
topic_facet | Aufsatzsammlung |
url | https://doi.org/10.4018/978-1-7998-6677-0 https://www.igi-global.com/gateway/book/256632 |
work_keys_str_mv | AT aggarwalneerajk limitationsandfutureapplicationsofquantumcryptography AT agrawalalka limitationsandfutureapplicationsofquantumcryptography AT chaurasiabrijeshk limitationsandfutureapplicationsofquantumcryptography AT khanraeesahmad limitationsandfutureapplicationsofquantumcryptography |