Holistic Approach to Quantum Cryptography in Cyber Security (eBook, ePUB)
Redaktion: Bhushan, Shashi; Singh, Anuj Kumar; Ravi, Renjith V.; Kumar, Pramod; Kumar, Manoj
48,95 €
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
48,95 €
Als Download kaufen
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
24 °P sammeln
Holistic Approach to Quantum Cryptography in Cyber Security (eBook, ePUB)
Redaktion: Bhushan, Shashi; Singh, Anuj Kumar; Ravi, Renjith V.; Kumar, Pramod; Kumar, Manoj
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The text covers concepts of cyber security through quantum computing and quantum cryptography in a single volume. It will be a useful text for graduate students, academic researchers, and professionals in areas including electrical and electronics engineering, computer science, and information technology.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 5.95MB
The text covers concepts of cyber security through quantum computing and quantum cryptography in a single volume. It will be a useful text for graduate students, academic researchers, and professionals in areas including electrical and electronics engineering, computer science, and information technology.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 256
- Erscheinungstermin: 9. August 2022
- Englisch
- ISBN-13: 9781000614503
- Artikelnr.: 64177136
- Verlag: Taylor & Francis
- Seitenzahl: 256
- Erscheinungstermin: 9. August 2022
- Englisch
- ISBN-13: 9781000614503
- Artikelnr.: 64177136
Shashi Bhushan is Assistant Professor at the University of Petroleum and Energy Studies. He earned a BE degree from the University of Rajasthan, India, an MTech degree in Computer Science from the Amity University Rajasthan in 2013, and a PhD degree in Computer Science and Engineering. He has 10 years of university-level teaching experience in Computer Science. He has several patents in the area of the internet of things (IoT). He has published many articles in IEEE, Springer, and other reputed journals and conferences. As a technical member and Publicity Chair, he has organized several international conferences. His areas of research include wireless sensor networks and the internet of things. Manoj Kumar earned his PhD in Computer Science from the Northcap University, Gurugram, Haryana. He earned an MSc (Information Security and Forensics) degree from ITB, Dublin, and MTech from ITM University, Gurugram, Haryana, India. He did his BTech in Computer Science at Kurukshetra University. Dr Kumar has more than 9.5 years of experience in research and academics. He has published over 45 papers in reputed journals and conferences. Presently, Dr Kumar is an Assistant Professor (SG) at the University of Petroleum and Energy Studies, Dehradun. He is a member of various professional bodies and has reviewed many reputed international journals. Pramod Kumar has been a Professor, Head (CSE) and Dean (CSE and IT) in Krishna Engineering College (KIET Group), Ghaziabad, since January 2018. He has also served as Director of the Tula's Institute, Dehradun, Uttarakhand. He has more than 23 years of experience in academics. He completed his PhD in Computer Science and Engineering (CSE) in 2011 and MTech (CSE) in 2006. He is a senior member of IEEE (SMIEEE) and Joint Secretary of IEEE UP Section. He has published widely his research findings related to computer networks, the internet of things (IoT), and machine learning in international journals and conferences. He has authored/co-authored more than 50 research papers and several chapters in edited books. He has supervised and co-supervised several MTech and PhD students. He has organized more than 12 IEEE International Conferences in India and abroad, and all the research papers of these conferences are now available in IEEE Explore. He is the editor of two books. He has published three patents and has conducted more than 15 Faculty Development Programs (FDP) in collaboration with EICT, IIT Roorkee, EICT, IIT Kanpur, and AKTU. Funding for the FDP, conference/seminar is from AICTE/UGC/AKTU, and departmental funding of various student projects is from DST and MEITY. He conducted the IEEE National Workshop on Research Paper writing on March 27, 2017, and the IEEE Women Symposium on February 21, 2016. Dr. Anuj Kumar Singh is an Assistant Professor at Krishna Engineering College, Ghaziabad. He received a BTech degree in Computer Science and Engineering from Punjab Technical University, India, an MTech degree in Computer Science and Engineering from the Uttarakhand Technical University, and a PhD degree in Computer Science and Engineering. He has 12 years of university-level teaching experience in computer science. He has several patents in the areas of IoT and Machine Learning. He has had many published articles in IEEE, Springer, and other reputed journals and conferences. He is a member of various professional bodies and has reviewed for many reputed international journals. Areas of research include wireless sensor networks, internet of things, and Machine Learning. Dr. Renjith V. Ravi is an Associate Professor and Head of the Department of Electronics and Communication Engineering and Coordinator of Post Graduate Programmes conducted at MEA Engineering College, Kerala, India. He graduated with a BTech degree in Electronics and Communication Engineering in 2007, ME degree in Embedded System Technology in 2011, and PhD in Electronics and Communication Engineering in 2019. He has published several research articles in SCIE and Scopus indexed journals, edited books, and IEEE International Conferences. He has served as a reviewer for SCIE and Scopus indexed journals from Springer, Elsevier, Inderscience, and IGI Global. He has edited two books from renowned international publishers. Dr Ravi has been granted one patent, one industrial design, and two copyrights. He had been awarded several outstanding achievements and service awards, and several best paper awards from IEEE International Conferences. He is a member of ISTE, IACSIT, IAENG, and SDIWC, and a senior member of SCIEI and SAISE. He has served as the Program Committee member, Session Chair, and reviewer of several national and international conferences conducted in India and abroad. His research areas include image cryptography, image processing, machine learning, and the internet of things. He is currently focusing his research on the area of secure image communication using image cryptography.
1. Towards Security in Software Defined Networks with Trust and Monitoring
2. Quantum key generation and distribution using Decoy state 3. Cyber
Security Techniques, Architectures and Design 4. Secured Unmanned Aerial
Vehicle based Fog Computing Network (UAV-FCN): A Review 5. Mars Surface
Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype 6.
Quantum Cryptography in Cybersecurity: A Holistic Approach 7. Cyber
Security Technique for Internet of Things using Machine Learning 8. Image
Encryption and Decryption through Quantum Cryptography 9. Cyber Security
Techniques Management 10. Quantum Cryptography And Quantum Key Distribution
11. Quantum Cryptography: Basics, Effects on Communication and Data
Management 12. Quantum Number: An Error Correction Circuits and Methods 13.
Risk Analysis Assessment of Inter-Dependency of Vulnerabilities In
Cyber-Physical Systems
2. Quantum key generation and distribution using Decoy state 3. Cyber
Security Techniques, Architectures and Design 4. Secured Unmanned Aerial
Vehicle based Fog Computing Network (UAV-FCN): A Review 5. Mars Surface
Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype 6.
Quantum Cryptography in Cybersecurity: A Holistic Approach 7. Cyber
Security Technique for Internet of Things using Machine Learning 8. Image
Encryption and Decryption through Quantum Cryptography 9. Cyber Security
Techniques Management 10. Quantum Cryptography And Quantum Key Distribution
11. Quantum Cryptography: Basics, Effects on Communication and Data
Management 12. Quantum Number: An Error Correction Circuits and Methods 13.
Risk Analysis Assessment of Inter-Dependency of Vulnerabilities In
Cyber-Physical Systems
1. Towards Security in Software Defined Networks with Trust and Monitoring
2. Quantum key generation and distribution using Decoy state 3. Cyber
Security Techniques, Architectures and Design 4. Secured Unmanned Aerial
Vehicle based Fog Computing Network (UAV-FCN): A Review 5. Mars Surface
Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype 6.
Quantum Cryptography in Cybersecurity: A Holistic Approach 7. Cyber
Security Technique for Internet of Things using Machine Learning 8. Image
Encryption and Decryption through Quantum Cryptography 9. Cyber Security
Techniques Management 10. Quantum Cryptography And Quantum Key Distribution
11. Quantum Cryptography: Basics, Effects on Communication and Data
Management 12. Quantum Number: An Error Correction Circuits and Methods 13.
Risk Analysis Assessment of Inter-Dependency of Vulnerabilities In
Cyber-Physical Systems
2. Quantum key generation and distribution using Decoy state 3. Cyber
Security Techniques, Architectures and Design 4. Secured Unmanned Aerial
Vehicle based Fog Computing Network (UAV-FCN): A Review 5. Mars Surface
Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype 6.
Quantum Cryptography in Cybersecurity: A Holistic Approach 7. Cyber
Security Technique for Internet of Things using Machine Learning 8. Image
Encryption and Decryption through Quantum Cryptography 9. Cyber Security
Techniques Management 10. Quantum Cryptography And Quantum Key Distribution
11. Quantum Cryptography: Basics, Effects on Communication and Data
Management 12. Quantum Number: An Error Correction Circuits and Methods 13.
Risk Analysis Assessment of Inter-Dependency of Vulnerabilities In
Cyber-Physical Systems