Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Holistic approach to quantum cryptography in cyber security
by
Shashi Bhushan, 1928- editor
in
Data encryption (Computer science)
/ Computer networks Security measures.
/ Quantum cryptography.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Holistic approach to quantum cryptography in cyber security
by
Shashi Bhushan, 1928- editor
in
Data encryption (Computer science)
/ Computer networks Security measures.
/ Quantum cryptography.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Holistic approach to quantum cryptography in cyber security
Book
Holistic approach to quantum cryptography in cyber security
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
\"This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques architectures and design, cyber security techniques management, software defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology\"-- Provided by publisher.
Publisher
CRC Press
Subject
ISBN
9781032253923, 9781032282701
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| QA76.9.D335 H65 2022 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.