Limitations and future applications of quantum cryptography Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
"Premier Reference Source"--Taken from front cover
Includes bibliographical references and index.
VLSI architecture of substitution box / Abhishek Kumar, Suman Tripathi -- Fundamentals of quantum computing, quantum supremacy and quantum machine learning / Kamaljit Lakhtaria, Vrunda Gadesha -- Quantum security for IoT to secure healthcare applications and it's data / Binod Kumar, Sheetal Prasad -- Data hiding in color image using steganography and cryptography to support message privacy / Sabyasachi Pramanik, Ramkrishna Ghosh, Sneh Kalra, Jayeeta Majumder, Digvijay Pandey, Souvik Pal -- Quantum computing : concept, applications and need of law for its enforcement / Neeraj Kumar, Alka Agrawal -- Quantum algorithms with applications to cryptography : quantum algorithms / Renata Wong, Amandeep Bhatia -- Implications on quantum cryptography : cryptography / Varsha Sahni, Neeraj Kumar, Sujatha Krishnamoorthy -- A contemporary study on quantum-computing security mechanisms in 5G networks / Rydhm Beri -- Define security and privacy using quantum internet / Nilay Mistry, Ankit Dholakiya, Jay Prajapati -- Quantum and visual crypto biometric based secured authentication system transactions, server and locker system in cloud / Nandini C., Jahnavi S. -- The role of quantum computing in software forensics & digital evidence : issues and challenges / Sandeep Sharma, Mazhar Khaliq -- Recent progress in quantum machine learning / Amandeep Bhatia, Renata Wong -- Advances of quantum machine learning / Bhanu Chander -- Image processing using quantum computing : a review / Bably Dolly, Deepa Raj -- Quantum cryptography for securing IoT based healthcare system / Anand Sharma -- Function optimization using IBM Q / Soumyajit Goswami.
"This book is for security experts as well as for IoT developers to help them understand the concepts related to quantum cryptography and classical cryptography and providing a direction to security professionals and IoT solution developers toward using approaches of Quantum Cryptography as available computational power increases"-- Provided by publisher
Online resource; title from digital title page (viewed on March 17, 2021).
There are no comments on this title.