logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications Adarsh Kumar

  • SKU: BELL-56595320
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications Adarsh Kumar
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications Adarsh Kumar instant download after payment.

Publisher: Springer Nature
File Extension: PDF
File size: 8.91 MB
Pages: 321
Author: Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan, (eds.)
ISBN: 9789819700882, 9819700884
Language: English
Year: 2024

Product desciption

Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications Adarsh Kumar by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan, (eds.) 9789819700882, 9819700884 instant download after payment.

Blockchains and the emergence of quantum technologies are two of the most significant emerging technical developments now underway that are demonstrating an ever-increasing spread both in academic and industrial domains. The problem related to the quantum threat and the execution of post-quantum signatures in a blockchain platform is a hot topic in today’s scientific community because blockchains have remarkably progressed in recent years and have found a variety of applications with the assumption that they will drastically increase their safety. The most recent quantum computers are capable of decoding secret encrypted keys and opening the network to attack by solving very difficult classical cryptography equations. In contrast to the billions of years of calculation required by conventional computer equipment, they can nearly instantly answer complicated mathematical problems. Researchers support the creation of innovative methods that incorporate encryption technology in the post-quantum future. Quantum computing, post-quantum cryptography, quantum attack-resistant blockchain, quantum blockchains, interdisciplinary solutions, and real-world use cases are just a few of the themes that are taken into account in the book Advances in Quantum Blockchain with Real-Time Applications. A distributed database that is based on quantum information theory and computing is known as a quantum blockchain. It is decentralized, encrypted, and distributed. The necessity for quantum versions of conventional blockchains and current developments in quantum computing are the causes of this. Quantum blockchain is one of several technologies still in the process of standardization, including algorithms, platforms, models, applications, systems, and databases. There is now more study being done in this area as a result of the development of quantum information theories and computation.

Related Products