Format:
1 Online-Ressource (xxvii, 305 Seiten)
,
Illustrationen
ISBN:
1799866793
,
9781799866794
Series Statement:
A volume in the Advances in information security, privacy, and ethics (AISPE) book series
Content:
The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing
Additional Edition:
Erscheint auch als Druck-Ausgabe ISBN 978-1-7998-6677-0
Additional Edition:
Erscheint auch als Druck-Ausgabe ISBN 1-7998-6677-7
Additional Edition:
Erscheint auch als Druck-Ausgabe, Softcover ISBN 978-1-7998-6678-7
Language:
English
Keywords:
Aufsatzsammlung
DOI:
10.4018/978-1-7998-6677-0
URL:
Volltext
(URL des Erstveröffentlichers)
URL:
Volltext
(URL des Erstveröffentlichers)