Holistic Approach to Quantum Cryptography in Cyber Security
  1. 244 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

About this book

This new book discusses the concepts while also highlighting the challenges in the

field of quantum cryptography and also covering cryptographic techniques and cyber

security techniques, in a single volume.

It comprehensively covers important topics in the field of quantum cryptography

with applications, including quantum key distribution, position-based quantum

cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber

security techniques' architectures and design, cyber security techniques management,

software-defined networks, and cyber security techniques for 5G communication.

The text also discusses the security of practical quantum key distribution systems,

applications and algorithms developed for quantum cryptography, as well as cyber

security through quantum computing and quantum cryptography.

The text will be beneficial for graduate students, academic researchers, and

professionals working in the fields of electrical engineering, electronics and

communications engineering, computer science, and information technology.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Holistic Approach to Quantum Cryptography in Cyber Security by Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh, Shashi Bhushan,Manoj Kumar,Pramod Kumar,Renjith V. Ravi,Anuj Kumar Singh in PDF and/or ePUB format, as well as other popular books in Computer Science & Cryptography. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2022
Print ISBN
9781032253923
eBook ISBN
9781000614503

Table of contents

  1. Cover
  2. Half-Title
  3. Title
  4. Copyright
  5. Contents
  6. Preface
  7. Editors
  8. Contributors List
  9. Chapter 1 Toward Security in Software-Defined Networks with Trust and Monitoring
  10. Chapter 2 Quantum Key Generation and Distribution Using Decoy State
  11. Chapter 3 Cyber Security Techniques, Architectures, and Design
  12. Chapter 4 Secured Unmanned Aerial Vehicle-based Fog Computing Network: A Review
  13. Chapter 5 Mars Surface Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype
  14. Chapter 6 Quantum-Safe Asymmetric Cryptosystems: Current Solutions and Future Directions against Quantum Attacks
  15. Chapter 7 Cyber Security Technique for Internet of Things Using Machine Learning
  16. Chapter 8 Image Encryption and Decryption through Quantum Cryptography
  17. Chapter 9 Cyber Security Techniques Management
  18. Chapter 10 Quantum Cryptography and Quantum Key Distribution
  19. Chapter 11 Quantum Cryptography: Basics, Effects on Communication, and Data Management
  20. Chapter 12 Quantum Number: Error Correction Circuits and Methods
  21. Chapter 13 Risk Analysis Assessment of Interdependency of Vulnerabilities: In Cyber-Physical Systems
  22. Index