| LDR | | 05299cmm u2200721 i 4500 |
| 001 | | 000000340602 |
| 003 | | EBZ |
| 005 | | 20260127112338 |
| 006 | | m e u |
| 007 | | cr bn||||m|||a |
| 008 | | 241214s2025 pau fob 001 0 eng d |
| 020 | |
▼a 9798369392225
▼q PDF |
| 020 | |
▼a 9798369392232
▼q (electronic bk.) |
| 020 | |
▼z 9798369392201
▼q print |
| 024 | 7 |
▼a 10.4018/979-8-3693-9220-1
▼2 doi |
| 040 | |
▼a EBZ
▼b eng
▼c EBZ
▼d 248032 |
| 049 | |
▼a MAIN |
| 050 | 4 |
▼a TK5102.94
▼b .H37 2025e |
| 082 | 04 |
▼a 003/.54
▼2 23 |
| 245 | 00 |
▼a Harnessing quantum cryptography for next-generation security solutions /
▼c Nirbhay Kumar Chaubey, Neha Chaubey, editors. |
| 260 | |
▼a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
▼b IGI Global,
▼c 2025. |
| 300 | |
▼a 1 online resource (25 PDFs (648 pages)). |
| 336 | |
▼a text
▼2 rdacontent |
| 337 | |
▼a electronic
▼2 isbdmedia |
| 338 | |
▼a online resource
▼2 rdacarrier |
| 341 | 0 |
▼a textual
▼2 sapdv
▼3 EBSCOhost |
| 490 | 1 |
▼a Advances in information security, privacy, and ethics (AISPE) book series |
| 504 | |
▼a Includes bibliographical references and index. |
| 505 | 0 |
▼a Preface -- Chapter 1. Exploring the Frontier: Introduction to Quantum Computing and Quantum Cryptography -- Chapter 2. Harnessing Quantum Mechanics for Next-Generation Security Solutions -- Chapter 3. Analysis of Drop-In-Replaceability Applying Post-Quantum Cryptography Techniques -- Chapter 4. Code-Based Cryptography and Its Place in Quantum-Safe Strategies -- Chapter 5. Harnessing Quantum Uncertainty: Exploring the Security Landscape of Quantum True Random Number Generators -- Chapter 6. Quantum Machine Learning Architecture for EEG-Based Emotion Recognition -- Chapter 7. Quantum Public Key Cryptography -- Chapter 8. Quantum Key Distribution in Securing Next-Generation Cyber-Physical Systems: Opportunities and Challenges -- Chapter 9. Enhancing Physical Layer Security Over 6G Wireless Networks via Quantum Key Deployment -- Chapter 10. Network Slicing With Quantum Key Distribution for 5G and Beyond Vehicular Networks -- Chapter 11. Securing Vehicle Communication Networks: Quantum Cryptography Integration in IoV -- Chapter 12. Quantum Secure Key Generation for QKD Protocols Using Quantum Gates -- Chapter 13. Role of Quantum Gates Towards Cryptographic Applications -- Chapter 14. Implementation of RQFT-QTRNG Using Quantum Gates in the IBM Quantum Lab -- Chapter 15. A Study of Secret Image Sharing Schemes Using Visual and Quantum Cryptography -- Chapter 16. Quantum Image Cryptography of Gingerbreadman Map by Using Pixel Shuffling -- Chapter 17. The Quantum Leap in Financial Security Safeguarding E-Commerce Transactions -- Chapter 18. Quantum Cryptography Federated Learning Credit Card Fraud Detection Imbalanced Data: SMOTE-ADA Boost Framework -- Compilation of References -- About the Contributors -- Index. |
| 520 | 3 |
▼a Harnessing Quantum Cryptography for Next-Generation Security Solutions serves as an indispensable scholarly resource for those navigating the evolving landscape of cryptography and cybersecurity. It compiles the latest research and advancements in quantum applications, covering a broad spectrum of topics such as e-commerce, machine learning, and privacy. Security analysts, software security engineers, data scientists, academics, or policymakers will find that this comprehensive guide offers the insights and knowledge necessary to stay ahead in the world of cyber security. |
| 532 | 0 |
▼3 EBSCOhost
▼a "EBSCO evaluates our products based on the Web Content Accessibility Guidelines (WCAG) and the related Section 508 and EN 301 549 regulations in the US and EU. Most EBSCO products are substantially conformant with WCAG 2.2 level AA." Source: https://connect.ebsco.com/s/article/EBSCO-VPATs?language=en_US. Last accessed April 22, 2025. |
| 588 | |
▼a Description based on title screen (IGI Global, viewed 12/14/2024). |
| 590 | |
▼a Added to collection customer.56279.3 |
| 650 | 0 |
▼a Quantum cryptography. |
| 650 | 0 |
▼a Quantum computing
▼x Security measures. |
| 653 | |
▼a 6G Wireless Networks. |
| 653 | |
▼a Code-Based Cryptology. |
| 653 | |
▼a Credit Card Fraud Detection. |
| 653 | |
▼a Cyber-Physical Systems. |
| 653 | |
▼a Drop-In-Replaceability. |
| 653 | |
▼a E-Commerce Transactions. |
| 653 | |
▼a Emotion Recognition. |
| 653 | |
▼a Machine Learning Architecture. |
| 653 | |
▼a Network Slicing. |
| 653 | |
▼a Next-Gen Security Solutions. |
| 653 | |
▼a Public Key. |
| 653 | |
▼a Quantum Computing. |
| 653 | |
▼a Quantum Cryptography. |
| 653 | |
▼a Quantum Gates. |
| 653 | |
▼a Quantum Key Deployment. |
| 653 | |
▼a Quantum Mechanics. |
| 653 | |
▼a Secret Image Sharing Schemes. |
| 653 | |
▼a True Random Number Generators. |
| 653 | |
▼a Vehicle Communication Networks. |
| 700 | 1 |
▼a Chaubey, Neha,
▼e editor. |
| 700 | 1 |
▼a Chaubey, Nirbhay Kumar,
▼e editor. |
| 710 | 2 |
▼a IGI Global,
▼e publisher. |
| 776 | 08 |
▼i Print version:
▼z 9798369392201 |
| 830 | 0 |
▼a Advances in information security, privacy, and ethics (AISPE) book series. |
| 856 | 40 |
▼3 EBSCOhost
▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=4093586 |
| 936 | |
▼a BATCHLOAD |
| 938 | |
▼a IGI Global
▼b IGIG
▼n 00354815 |
| 938 | |
▼a EBSCOhost
▼b EBSC
▼n 4093586 |
| 990 | |
▼a 관리자 |