Description
Taylor and Francis Ltd Holistic Approach to Quantum Cryptography in Cyber Security 1st Edition 2022 Hardbound by Bhushan, Shashi
This new book discusses the concepts while also highlighting the challenges in the_x000D__x000D_field of quantum cryptography and also covering cryptographic techniques and cyber_x000D__x000D_security techniques, in a single volume._x000D__x000D_It comprehensively covers important topics in the field of quantum cryptography_x000D__x000D_with applications, including quantum key distribution, position-based quantum_x000D__x000D_cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber_x000D__x000D_security techniques' architectures and design, cyber security techniques management,_x000D__x000D_software-defined networks, and cyber security techniques for 5G communication._x000D__x000D_The text also discusses the security of practical quantum key distribution systems,_x000D__x000D_applications and algorithms developed for quantum cryptography, as well as cyber_x000D__x000D_security through quantum computing and quantum cryptography._x000D__x000D_The text will be beneficial for graduate students, academic researchers, and_x000D__x000D_professionals working in the fields of electrical engineering, electronics and_x000D__x000D_communications engineering, computer science, and information technology._x000D_ _x000D_
1. Towards Security in Software Defined Networks with Trust and Monitoring 2. Quantum key generation and distribution using Decoy state 3. Cyber Security Techniques, Architectures and Design 4. Secured Unmanned Aerial Vehicle based Fog Computing Network (UAV-FCN): A Review 5. Mars Surface Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype 6. Quantum Cryptography in Cybersecurity: A Holistic Approach 7. Cyber Security Technique for Internet of Things using Machine Learning 8. Image Encryption and Decryption through Quantum Cryptography 9. Cyber Security Techniques Management 10. Quantum Cryptography And Quantum Key Distribution 11. Quantum Cryptography: Basics, Effects on Communication and Data Management 12. Quantum Number: An Error Correction Circuits and Methods 13. Risk Analysis Assessment of Inter-Dependency of Vulnerabilities In Cyber-Physical Systems_x000D_