Vtome.ru - электронная библиотека

Holistic Approach to Quantum Cryptography in Cyber Security

  • Добавил: literator
  • Дата: 8-03-2023, 12:04
  • Комментариев: 0
Holistic Approach to Quantum Cryptography in Cyber SecurityНазвание: Holistic Approach to Quantum Cryptography in Cyber Security
Автор: Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi
Издательство: CRC Press
Год: 2023
Страниц: 257
Язык: английский
Формат: pdf (true), epub (true)
Размер: 25.8 MB

This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques, in a single volume.

It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques’ architectures and design, cyber security techniques management, software-defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography.

Quantum cryptography utilizes the subtle properties of quantum mechanics, for example, the quantum no-cloning hypothesis and the Heisenberg uncertainty principle. In contrast to conventional cryptography, whose security is regularly based on unproven computational assumptions, quantum cryptography has a significant advantage in that its security is frequently based on the laws of physics. Thus far, the proposed applications of quantum cryptography include quantum key distribution (QKD) and quantum bit commitment.

Many of us are already using wireless sensor devices in our day-to-day life, but security in those devices or applications using those devices is very important. Comprehensive analysis of practical quantum cryptography systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels is also observed. Quantum secret sharing is one of the important parts of quantum cryptography.

Apart from these, security and privacy are vital to modern blockchain technology since they can exist without an authorized third party, which means that there may not be a trusted responsible person or organization in charge of systems. Security of the current systems is based on computational hardness assumptions, and many of the standard cryptography systems are known to be vulnerable to the advent of full-fledged quantum computers. On the other hand, it is possible to make a blockchain more secure by quantum information technology. So these are some of the main reasons for writing about quantum cryptography and its applications.

The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, Computer Science, and information technology.

Contents:
Preface
Chapter 1 Toward Security in Software-Defined Networks with Trust and Monitoring
Chapter 2 Quantum Key Generation and Distribution Using Decoy State
Chapter 3 Cyber Security Techniques, Architectures, and Design
Chapter 4 Secured Unmanned Aerial Vehicle-based Fog Computing Network: A Review
Chapter 5 Mars Surface Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype
Chapter 6 Quantum-Safe Asymmetric Cryptosystems: Current Solutions and Future Directions against Quantum Attacks
Chapter 7 Cyber Security Technique for Internet of Things Using Machine Learning
Chapter 8 Image Encryption and Decryption through Quantum Cryptography
Chapter 9 Cyber Security Techniques Management
Chapter 10 Quantum Cryptography and Quantum Key Distribution
Chapter 11 Quantum Cryptography: Basics, Effects on Communication, and Data Management
Chapter 12 Quantum Number: Error Correction Circuits and Methods
Chapter 13 Risk Analysis Assessment of Interdependency of Vulnerabilities: In Cyber-Physical Systems
Index

Скачать Holistic Approach to Quantum Cryptography in Cyber Security












ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.