
Holistic Approach to Quantum Cryptography in Cyber Security
- 244 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Holistic Approach to Quantum Cryptography in Cyber Security
About this book
This new book discusses the concepts while also highlighting the challenges in the
field of quantum cryptography and also covering cryptographic techniques and cyber
security techniques, in a single volume.
It comprehensively covers important topics in the field of quantum cryptography
with applications, including quantum key distribution, position-based quantum
cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber
security techniques' architectures and design, cyber security techniques management,
software-defined networks, and cyber security techniques for 5G communication.
The text also discusses the security of practical quantum key distribution systems,
applications and algorithms developed for quantum cryptography, as well as cyber
security through quantum computing and quantum cryptography.
The text will be beneficial for graduate students, academic researchers, and
professionals working in the fields of electrical engineering, electronics and
communications engineering, computer science, and information technology.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half-Title
- Title
- Copyright
- Contents
- Preface
- Editors
- Contributors List
- Chapter 1 Toward Security in Software-Defined Networks with Trust and Monitoring
- Chapter 2 Quantum Key Generation and Distribution Using Decoy State
- Chapter 3 Cyber Security Techniques, Architectures, and Design
- Chapter 4 Secured Unmanned Aerial Vehicle-based Fog Computing Network: A Review
- Chapter 5 Mars Surface Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype
- Chapter 6 Quantum-Safe Asymmetric Cryptosystems: Current Solutions and Future Directions against Quantum Attacks
- Chapter 7 Cyber Security Technique for Internet of Things Using Machine Learning
- Chapter 8 Image Encryption and Decryption through Quantum Cryptography
- Chapter 9 Cyber Security Techniques Management
- Chapter 10 Quantum Cryptography and Quantum Key Distribution
- Chapter 11 Quantum Cryptography: Basics, Effects on Communication, and Data Management
- Chapter 12 Quantum Number: Error Correction Circuits and Methods
- Chapter 13 Risk Analysis Assessment of Interdependency of Vulnerabilities: In Cyber-Physical Systems
- Index