Quantum Cryptography and the Future of Cyber Security 1st edition by Chaubey Nirbhay – Ebook PDF Instant Download/DeliveryISBN: 1799822567, 9781799822561
Full download Quantum Cryptography and the Future of Cyber Security 1st edition after payment.
Product details:
ISBN-10 : 1799822567
ISBN-13 : 9781799822561
Author : Chaubey Nirbhay
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.
Quantum Cryptography and the Future of Cyber Security 1st Table of contents:
Section 1: Quantum Cryptography
Chapter 1: Post-Quantum Cryptography and Quantum Cloning
ABSTRACT
INTRODUCTION
CODE-BASED CRYPTOGRAPHY
LATTICE-BASED CRYPTOGRAPHY
MULTIVARIATE CRYPTOGRAPHY
HASH-BASED CRYPTOGRAPHY
CONCLUSION
REFERENCES
Chapter 2: Quantum Key Distribution
ABSTRACT
INTRODUCTION
CONCLUSION
REFERENCES
Chapter 3: Optimal Parameter Prediction for Secure Quantum Key Distribution Using Quantum Machine Learning Models
ABSTRACT
INTRODUCTION
QUANTUM COMPUTING: AN OVERVIEW
QUANTUM CRYPTOGRAPHY: AN OVERVIEW
APPLICATIONS OF QUANTUM CRYPTOGRAPHY
QUANTUM-BASED KEY DISTRIBUTION (QKD)
QUANTUM MACHINE LEARNING (QML)
QUANTUM FEED FORWARD NEURAL NETWORK (QFFNN)
QUANTUM RECURRENT NEURAL NETWORK (QRNN)
QUANTUM BACKPROPAGATION NEURAL NETWORK (QBNN)
QUANTUM CONVOLUTED NEURAL NETWORK (QCNN)
QUANTUM REINFORCEMENT LEARNING (QRL)
QUANTUM Q LEARNING (QQL)
QUANTUM PARTICLE SWARM OPTIMIZATION (QPSO)
QUANTUM ANNEALING (QA)
CONCLUSION
REFERENCES
Chapter 4: LFSR-Keyed MUX for Random Number Generation in Nano Communication Using QCA
ABSTRACT
INTRODUCTION
BACKGROUND
PRELIMINARIES
PROPOSED METHODOLOGY
RESULTS AND DISCUSSION
FUTURE RESEARCH DIRECTIONS
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
Chapter 5: Quantum Cryptography Key Distribution
ABSTRACT
INTRODUCTION
CLASSICAL CRYPTOGRAPHY
QUANTUM CRYPTOGRAPHY
QUANTUM CRYPTOGRAPHY IMPLEMENTATION
QUANTUM CRYPTOGRAPHY PROTOCOL
QKD CHARACTERISTICS
EAVESDROPPING
LARGE SCALE QUANTUM KEY CHALLENGES
OUTLINE OF QUANTUM-RESISTANT CRYPTOGRAPHY
CONCLUSION
REFERENCES
Chapter 6: Quantum Internet and E-Governance
ABSTRACT
INTRODUCTION
BACKGROUND
HARDWARE COMPONENTS TO BUILD QUANTUM NETWORK
QUANTUM KEY EXCHANGE
STAGES OF QUANTUM INTERNET DEVELOPMENT
CHALLENGES WITH QUANTUM NETWORKS
CONCLUSION AND FURTHER RESEARCH DIRECTIONS
REFERENCES
Section 2: Cyber Security
Chapter 7: Critical Infrastructure Security
ABSTRACT
INTRODUCTION
ATTACK CATEGORISATION
ATTACK AGAINST THE SMART GRID
CPS ATTACK MODEL
3M ARCHITECTURE FOR CYBER PHYSICAL SYSTEMS – AN INTRODUCTION
DEFENCE AGAINST CP ATTACK
CONNECTING THE GAP: CYBER-PHYSICAL SYSTEM SECURITY
CONCLUSION
REFERENCES
Chapter 8: Cryptography in the Healthcare Sector With Modernized Cyber Security
ABSTRACT
INTRODUCTION
NECESSITY OF CRYPTOGRAPHY IN HEALTHCARE
CRYPTOGRAPHY – QUANTUM TECHNOLOGY- QUANTUM KEY
BLOCKCHAIN – INDUSTRIES – HEALTHCARE
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
APPENDIX 1
APPENDIX 2
Chapter 9: Improved Methodology to Detect Advanced Persistent Threat Attacks
ABSTRACT
INTRODUCTION
LITERATURE SURVEY
ADVANCED PERSISTENT ATTACK CHARACTERISTICS
PROPOSED MODEL
CONCLUSION
REFERENCES
Chapter 10: IoT and Cyber Security
ABSTRACT
INTRODUCTION
FUTURE RESEARCH DIRECTIONS
CONCLUSION
REFERENCES
Chapter 11: Security and Privacy in Big Data Computing
ABSTRACT
INTRODUCTION
RELATED WORK
OBSERVATIONS
TECHNIQUES
HOMOMORPHIC ENCRYPTION TECHNIQUE
CERTIFICATELESS PROXY RE-ENCRYPTION SCHEME (CL-PRE)
ATTRIBUTE BASED ACCESS CONTROL
BLOCKCHAIN ACCESS CONTROL SCHEME
DE-IDENTIFICATION SCHEME
PRIVACY AND SECURITY PRESERVATION IN BLOCKCHAIN
ADAPTIVE UTILITY BASED ANONYMIZATION MODEL
FUTURE DIRECTIONS
CONCLUSION
REFERENCES
Chapter 12: Cyber Security Techniques for Internet of Things (IoT)
ABSTRACT
INTRODUCTION
INTERNET OF THINGS
OPPORTUNITIES DOES IOT OFFER
ISSUES DRIVING INDUSTRY OF THE IOT
IOT STRATEGIC PRINCIPLES
IOT CYBERSECURITY CHALLENGES AND SOLUTIONS
SAFE BUILD A SECURE FUTURE FOR THE INCORPORATE DIGITAL TWIN
MAKING IOT SECURE: A HOLISTIC APPROACH
CONCLUSION AND DISCUSSION
REFERENCES
Chapter 13: Cyber Security Aspects of Virtualization in Cloud Computing Environments
ABSTRACT
INTRODUCTION
BACKGROUND
WHAT IS CYBERSECURITY? WHY IS CYBERSECURITY AN IMPORTANT CONCERN?
VIRTUALIZATION SECURITY
VIRTUALIZATION SECURITY SOLUTIONS
THE FLUSH+FLUSH CACHE ATTACK
CONCLUSION AND FUTURE WORK
ACKNOWLEDGMENT
People also search for Quantum Cryptography and the Future of Cyber Security 1st:
what is quantum cyber security
future scope of cyber security
what is the future of cyber security
quantum cryptography cyber security
quantum computing and cyber security