Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications

PDF
ca. 149,79
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Springer Nature Singapore img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Geowissenschaften

Beschreibung

This book focuses on the sustainable security practices in the domain of blockchain, quantum, and post-quantum technologies dealing with the real-time applications. The topics discussed in this book include banking applications, protection of digital assets in healthcare, military defense applications, supply chain management, secure messaging, and keyless secure infrastructures.

Blockchains and quantum technologies are the emerging technological developments both in academic and industrial domains. The problems related to quantum threat and execution of post-quantum signatures in a blockchain platform have become hot topics in today's scientific community because they have remarkably progressed in recent years and have found a variety of applications.

This book is a valuable resource for academicians, researchers, students, and technicians in the field of blockchain and quantum computing.

Weitere Titel in dieser Kategorie
Cover Forest Frontier
Peter A. Furley
Cover Forest Frontier
Peter A. Furley
Cover Stoves and Trees
Patricia Moss
Cover Man and Place
Mohamed Fekry
Cover Making the Rural Urban
Sebastián Felipe Villamizar-Santamaría
Cover Climate Change
Robert E Marx

Kundenbewertungen

Schlagwörter

Security Services, Cryptology, Information Security, Sustainable Security, Network Security, Data Security, Cryptography, Cryptocurrency