Quantum-Safe Cryptography Algorithms and Approaches : : Impacts of Quantum Computing on Cybersecurity / / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman.
Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. This book...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 |
---|---|
MitwirkendeR: | |
HerausgeberIn: | |
Place / Publishing House: | Berlin ;, Boston : : De Gruyter, , [2023] ©2023 |
Year of Publication: | 2023 |
Language: | English |
Series: | Quantum Computing ,
|
Online Access: | |
Physical Description: | 1 online resource (XVII, 327 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9783110798159 |
---|---|
ctrlnum |
(DE-B1597)626716 (OCoLC)1390919443 |
collection |
bib_alma |
record_format |
marc |
spelling |
Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman. Berlin ; Boston : De Gruyter, [2023] ©2023 1 online resource (XVII, 327 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Quantum Computing , 2940-0112 Frontmatter -- Preface -- Contents -- Biographies -- List of contributors -- 1 Optimizing the traffic flow in VANETs using deep quantum annealing -- 2 Quantum annealing-based routing in UAV network -- 3 Cyberbullying detection of social network tweets using quantum machine learning -- 4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network -- 5 Machine learning-based quantum modeling to classify the traffic flow in smart cities -- 6 IoT attack detection using quantum deep learning in large-scale networks -- 7 Quantum transfer learning to detect passive attacks in SDN-IOT -- 8 Intrusion detection framework using quantum computing for mobile cloud computing -- 9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes -- 10 Study of quantum computing for data analytics of predictive and prescriptive analytics models -- 11 A review of different techniques and challenges of quantum computing in various applications -- 12 Review and significance of cryptography and machine learning in quantum computing -- 13 An improved genetic quantum cryptography model for network communication -- 14 Code-based post-quantum cryptographic technique: digital signature -- 15 Post-quantum cryptography for the detection of injection attacks in small-scale networks -- 16 RSA security implementation in quantum computing for a higher resilience -- 17 Application of quantum computing for digital forensic investigation -- 18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones -- 19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system -- 20 Mitigating the risk of quantum computing in cyber security era -- 21 IoMT-based data aggregation using quantum learning -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. This book presents an overview of all the cross-disciplinary developments in cybersecurity that are being generated by the advancements in quantum computing. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024) Artificial Neural Networks. Information Security. Quantum Computing. Quantum-safe Cryptography. COMPUTERS / Intelligence (AI) & Semantics. bisacsh Information security. Aggarwal, Alankrita, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Al-Turjman, Fadi, editor. edt http://id.loc.gov/vocabulary/relators/edt Anuradha, B., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Avasthi, Sandhya, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Balaji, N. Alangudi, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Bhavadharini, R. M., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Chari, V. Dhanunjana, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Devi, B. Aruna, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Gaba, Shivani, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Garg, Puneet, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Gupta, Swati, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Hari, K. Sri, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Harsha, B. K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Karthik, S., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Karthikeyan, N., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kavitha, M. S, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kishor, Kausha, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kishor, Kaushal, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kowshika, A., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kumar, M. Sunil, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kumar, Swarn Avinash, editor. edt http://id.loc.gov/vocabulary/relators/edt Kumari, Pushpa, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Manisha, Kumari, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Mayan, J. Albert, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Menaka, R., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Murthy, G. R. S., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Nagpal, Shally, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Palanikkumar, D., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Parveen, H. Summia, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Paul, A. Christopher, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Periyakaruppan, K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Prakash, Ayushi, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Preethi, M. P., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Purohit, Nitin, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Rao, G. Madhava, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Rao, Ramachandra G., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Ravishankar, T. Nadana, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Rawat, Mukesh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Reddy, G. Swamy, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Sabitha, R., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Sangeetha, K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Saravanan, V., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Sathya, R., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Sekaran, S. Chandra, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Shanthini, J., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Shobana, M., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Singh, Raghuraj, editor. edt http://id.loc.gov/vocabulary/relators/edt Sivaprakash, P., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Sreelatha, P., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Sudhakar, Annapantula, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Sumathi, T., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Tasisa, Buli Yohannis, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Tesema, Mulugeta, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Tesfaye, Leta Jule, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Tesfayohanis, Mihretab, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Thenmalar, S., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Thenmozhi,, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Thippeswamy, G. R., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Thirukumaran, S., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Tiwari, Swati, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Virmani, Deepali, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Yadav, Kamlesh Kumar, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Yadav, Satya Prakash, editor. edt http://id.loc.gov/vocabulary/relators/edt Yadav, Vibhash, editor. edt http://id.loc.gov/vocabulary/relators/edt Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 9783111175782 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2023 English 9783111319292 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2023 9783111318912 ZDB-23-DGG Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2023 English 9783111319124 Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2023 9783111318165 ZDB-23-DEI EPUB 9783110798364 print 9783110798005 https://doi.org/10.1515/9783110798159 https://www.degruyter.com/isbn/9783110798159 Cover https://www.degruyter.com/document/cover/isbn/9783110798159/original |
language |
English |
format |
eBook |
author2 |
Aggarwal, Alankrita, Aggarwal, Alankrita, Al-Turjman, Fadi, Al-Turjman, Fadi, Anuradha, B., Anuradha, B., Avasthi, Sandhya, Avasthi, Sandhya, Balaji, N. Alangudi, Balaji, N. Alangudi, Bhavadharini, R. M., Bhavadharini, R. M., Chari, V. Dhanunjana, Chari, V. Dhanunjana, Devi, B. Aruna, Devi, B. Aruna, Gaba, Shivani, Gaba, Shivani, Garg, Puneet, Garg, Puneet, Gupta, Swati, Gupta, Swati, Hari, K. Sri, Hari, K. Sri, Harsha, B. K., Harsha, B. K., Karthik, S., Karthik, S., Karthikeyan, N., Karthikeyan, N., Kavitha, M. S, Kavitha, M. S, Kishor, Kausha, Kishor, Kausha, Kishor, Kaushal, Kishor, Kaushal, Kowshika, A., Kowshika, A., Kumar, M. Sunil, Kumar, M. Sunil, Kumar, Swarn Avinash, Kumar, Swarn Avinash, Kumari, Pushpa, Kumari, Pushpa, Manisha, Kumari, Manisha, Kumari, Mayan, J. Albert, Mayan, J. Albert, Menaka, R., Menaka, R., Murthy, G. R. S., Murthy, G. R. S., Nagpal, Shally, Nagpal, Shally, Palanikkumar, D., Palanikkumar, D., Parveen, H. Summia, Parveen, H. Summia, Paul, A. Christopher, Paul, A. Christopher, Periyakaruppan, K., Periyakaruppan, K., Prakash, Ayushi, Prakash, Ayushi, Preethi, M. P., Preethi, M. P., Purohit, Nitin, Purohit, Nitin, Rao, G. Madhava, Rao, G. Madhava, Rao, Ramachandra G., Rao, Ramachandra G., Ravishankar, T. Nadana, Ravishankar, T. Nadana, Rawat, Mukesh, Rawat, Mukesh, Reddy, G. Swamy, Reddy, G. Swamy, Sabitha, R., Sabitha, R., Sangeetha, K., Sangeetha, K., Saravanan, V., Saravanan, V., Sathya, R., Sathya, R., Sekaran, S. Chandra, Sekaran, S. Chandra, Shanthini, J., Shanthini, J., Shobana, M., Shobana, M., Singh, Raghuraj, Singh, Raghuraj, Sivaprakash, P., Sivaprakash, P., Sreelatha, P., Sreelatha, P., Sudhakar, Annapantula, Sudhakar, Annapantula, Sumathi, T., Sumathi, T., Tasisa, Buli Yohannis, Tasisa, Buli Yohannis, Tesema, Mulugeta, Tesema, Mulugeta, Tesfaye, Leta Jule, Tesfaye, Leta Jule, Tesfayohanis, Mihretab, Tesfayohanis, Mihretab, Thenmalar, S., Thenmalar, S., Thenmozhi,, Thenmozhi,, Thippeswamy, G. R., Thippeswamy, G. R., Thirukumaran, S., Thirukumaran, S., Tiwari, Swati, Tiwari, Swati, Virmani, Deepali, Virmani, Deepali, Yadav, Kamlesh Kumar, Yadav, Kamlesh Kumar, Yadav, Satya Prakash, Yadav, Satya Prakash, Yadav, Vibhash, Yadav, Vibhash, |
author_facet |
Aggarwal, Alankrita, Aggarwal, Alankrita, Al-Turjman, Fadi, Al-Turjman, Fadi, Anuradha, B., Anuradha, B., Avasthi, Sandhya, Avasthi, Sandhya, Balaji, N. Alangudi, Balaji, N. Alangudi, Bhavadharini, R. M., Bhavadharini, R. M., Chari, V. Dhanunjana, Chari, V. Dhanunjana, Devi, B. Aruna, Devi, B. Aruna, Gaba, Shivani, Gaba, Shivani, Garg, Puneet, Garg, Puneet, Gupta, Swati, Gupta, Swati, Hari, K. Sri, Hari, K. Sri, Harsha, B. K., Harsha, B. K., Karthik, S., Karthik, S., Karthikeyan, N., Karthikeyan, N., Kavitha, M. S, Kavitha, M. S, Kishor, Kausha, Kishor, Kausha, Kishor, Kaushal, Kishor, Kaushal, Kowshika, A., Kowshika, A., Kumar, M. Sunil, Kumar, M. Sunil, Kumar, Swarn Avinash, Kumar, Swarn Avinash, Kumari, Pushpa, Kumari, Pushpa, Manisha, Kumari, Manisha, Kumari, Mayan, J. Albert, Mayan, J. Albert, Menaka, R., Menaka, R., Murthy, G. R. S., Murthy, G. R. S., Nagpal, Shally, Nagpal, Shally, Palanikkumar, D., Palanikkumar, D., Parveen, H. Summia, Parveen, H. Summia, Paul, A. Christopher, Paul, A. Christopher, Periyakaruppan, K., Periyakaruppan, K., Prakash, Ayushi, Prakash, Ayushi, Preethi, M. P., Preethi, M. P., Purohit, Nitin, Purohit, Nitin, Rao, G. Madhava, Rao, G. Madhava, Rao, Ramachandra G., Rao, Ramachandra G., Ravishankar, T. Nadana, Ravishankar, T. Nadana, Rawat, Mukesh, Rawat, Mukesh, Reddy, G. Swamy, Reddy, G. Swamy, Sabitha, R., Sabitha, R., Sangeetha, K., Sangeetha, K., Saravanan, V., Saravanan, V., Sathya, R., Sathya, R., Sekaran, S. Chandra, Sekaran, S. Chandra, Shanthini, J., Shanthini, J., Shobana, M., Shobana, M., Singh, Raghuraj, Singh, Raghuraj, Sivaprakash, P., Sivaprakash, P., Sreelatha, P., Sreelatha, P., Sudhakar, Annapantula, Sudhakar, Annapantula, Sumathi, T., Sumathi, T., Tasisa, Buli Yohannis, Tasisa, Buli Yohannis, Tesema, Mulugeta, Tesema, Mulugeta, Tesfaye, Leta Jule, Tesfaye, Leta Jule, Tesfayohanis, Mihretab, Tesfayohanis, Mihretab, Thenmalar, S., Thenmalar, S., Thenmozhi,, Thenmozhi,, Thippeswamy, G. R., Thippeswamy, G. R., Thirukumaran, S., Thirukumaran, S., Tiwari, Swati, Tiwari, Swati, Virmani, Deepali, Virmani, Deepali, Yadav, Kamlesh Kumar, Yadav, Kamlesh Kumar, Yadav, Satya Prakash, Yadav, Satya Prakash, Yadav, Vibhash, Yadav, Vibhash, |
author2_variant |
a a aa a a aa f a t fat f a t fat b a ba b a ba s a sa s a sa n a b na nab n a b na nab r m b rm rmb r m b rm rmb v d c vd vdc v d c vd vdc b a d ba bad b a d ba bad s g sg s g sg p g pg p g pg s g sg s g sg k s h ks ksh k s h ks ksh b k h bk bkh b k h bk bkh s k sk s k sk n k nk n k nk m s k ms msk m s k ms msk k k kk k k kk k k kk k k kk a k ak a k ak m s k ms msk m s k ms msk s a k sa sak s a k sa sak p k pk p k pk k m km k m km j a m ja jam j a m ja jam r m rm r m rm g r s m grs grsm g r s m grs grsm s n sn s n sn d p dp d p dp h s p hs hsp h s p hs hsp a c p ac acp a c p ac acp k p kp k p kp a p ap a p ap m p p mp mpp m p p mp mpp n p np n p np g m r gm gmr g m r gm gmr r g r rg rgr r g r rg rgr t n r tn tnr t n r tn tnr m r mr m r mr g s r gs gsr g s r gs gsr r s rs r s rs k s ks k s ks v s vs v s vs r s rs r s rs s c s sc scs s c s sc scs j s js j s js m s ms m s ms r s rs r s rs p s ps p s ps p s ps p s ps a s as a s as t s ts t s ts b y t by byt b y t by byt m t mt m t mt l j t lj ljt l j t lj ljt m t mt m t mt s t st s t st t t g r t gr grt g r t gr grt s t st s t st s t st s t st d v dv d v dv k k y kk kky k k y kk kky s p y sp spy s p y sp spy v y vy v y vy |
author2_role |
MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn |
author_sort |
Aggarwal, Alankrita, |
title |
Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / |
spellingShingle |
Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / Quantum Computing , Frontmatter -- Preface -- Contents -- Biographies -- List of contributors -- 1 Optimizing the traffic flow in VANETs using deep quantum annealing -- 2 Quantum annealing-based routing in UAV network -- 3 Cyberbullying detection of social network tweets using quantum machine learning -- 4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network -- 5 Machine learning-based quantum modeling to classify the traffic flow in smart cities -- 6 IoT attack detection using quantum deep learning in large-scale networks -- 7 Quantum transfer learning to detect passive attacks in SDN-IOT -- 8 Intrusion detection framework using quantum computing for mobile cloud computing -- 9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes -- 10 Study of quantum computing for data analytics of predictive and prescriptive analytics models -- 11 A review of different techniques and challenges of quantum computing in various applications -- 12 Review and significance of cryptography and machine learning in quantum computing -- 13 An improved genetic quantum cryptography model for network communication -- 14 Code-based post-quantum cryptographic technique: digital signature -- 15 Post-quantum cryptography for the detection of injection attacks in small-scale networks -- 16 RSA security implementation in quantum computing for a higher resilience -- 17 Application of quantum computing for digital forensic investigation -- 18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones -- 19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system -- 20 Mitigating the risk of quantum computing in cyber security era -- 21 IoMT-based data aggregation using quantum learning -- Index |
title_sub |
Impacts of Quantum Computing on Cybersecurity / |
title_full |
Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman. |
title_fullStr |
Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman. |
title_full_unstemmed |
Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman. |
title_auth |
Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / |
title_alt |
Frontmatter -- Preface -- Contents -- Biographies -- List of contributors -- 1 Optimizing the traffic flow in VANETs using deep quantum annealing -- 2 Quantum annealing-based routing in UAV network -- 3 Cyberbullying detection of social network tweets using quantum machine learning -- 4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network -- 5 Machine learning-based quantum modeling to classify the traffic flow in smart cities -- 6 IoT attack detection using quantum deep learning in large-scale networks -- 7 Quantum transfer learning to detect passive attacks in SDN-IOT -- 8 Intrusion detection framework using quantum computing for mobile cloud computing -- 9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes -- 10 Study of quantum computing for data analytics of predictive and prescriptive analytics models -- 11 A review of different techniques and challenges of quantum computing in various applications -- 12 Review and significance of cryptography and machine learning in quantum computing -- 13 An improved genetic quantum cryptography model for network communication -- 14 Code-based post-quantum cryptographic technique: digital signature -- 15 Post-quantum cryptography for the detection of injection attacks in small-scale networks -- 16 RSA security implementation in quantum computing for a higher resilience -- 17 Application of quantum computing for digital forensic investigation -- 18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones -- 19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system -- 20 Mitigating the risk of quantum computing in cyber security era -- 21 IoMT-based data aggregation using quantum learning -- Index |
title_new |
Quantum-Safe Cryptography Algorithms and Approaches : |
title_sort |
quantum-safe cryptography algorithms and approaches : impacts of quantum computing on cybersecurity / |
series |
Quantum Computing , |
series2 |
Quantum Computing , |
publisher |
De Gruyter, |
publishDate |
2023 |
physical |
1 online resource (XVII, 327 p.) Issued also in print. |
contents |
Frontmatter -- Preface -- Contents -- Biographies -- List of contributors -- 1 Optimizing the traffic flow in VANETs using deep quantum annealing -- 2 Quantum annealing-based routing in UAV network -- 3 Cyberbullying detection of social network tweets using quantum machine learning -- 4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network -- 5 Machine learning-based quantum modeling to classify the traffic flow in smart cities -- 6 IoT attack detection using quantum deep learning in large-scale networks -- 7 Quantum transfer learning to detect passive attacks in SDN-IOT -- 8 Intrusion detection framework using quantum computing for mobile cloud computing -- 9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes -- 10 Study of quantum computing for data analytics of predictive and prescriptive analytics models -- 11 A review of different techniques and challenges of quantum computing in various applications -- 12 Review and significance of cryptography and machine learning in quantum computing -- 13 An improved genetic quantum cryptography model for network communication -- 14 Code-based post-quantum cryptographic technique: digital signature -- 15 Post-quantum cryptography for the detection of injection attacks in small-scale networks -- 16 RSA security implementation in quantum computing for a higher resilience -- 17 Application of quantum computing for digital forensic investigation -- 18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones -- 19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system -- 20 Mitigating the risk of quantum computing in cyber security era -- 21 IoMT-based data aggregation using quantum learning -- Index |
isbn |
9783110798159 9783111175782 9783111319292 9783111318912 9783111319124 9783111318165 9783110798364 9783110798005 |
issn |
2940-0112 |
url |
https://doi.org/10.1515/9783110798159 https://www.degruyter.com/isbn/9783110798159 https://www.degruyter.com/document/cover/isbn/9783110798159/original |
illustrated |
Not Illustrated |
doi_str_mv |
10.1515/9783110798159 |
oclc_num |
1390919443 |
work_keys_str_mv |
AT aggarwalalankrita quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT alturjmanfadi quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT anuradhab quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT avasthisandhya quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT balajinalangudi quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT bhavadharinirm quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT charivdhanunjana quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT devibaruna quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT gabashivani quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT gargpuneet quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT guptaswati quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT hariksri quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT harshabk quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT karthiks quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT karthikeyann quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT kavithams quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT kishorkausha quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT kishorkaushal quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT kowshikaa quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT kumarmsunil quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT kumarswarnavinash quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT kumaripushpa quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT manishakumari quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT mayanjalbert quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT menakar quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT murthygrs quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT nagpalshally quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT palanikkumard quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT parveenhsummia quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT paulachristopher quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT periyakaruppank quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT prakashayushi quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT preethimp quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT purohitnitin quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT raogmadhava quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT raoramachandrag quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT ravishankartnadana quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT rawatmukesh quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT reddygswamy quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT sabithar quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT sangeethak quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT saravananv quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT sathyar quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT sekaranschandra quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT shanthinij quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT shobanam quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT singhraghuraj quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT sivaprakashp quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT sreelathap quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT sudhakarannapantula quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT sumathit quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT tasisabuliyohannis quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT tesemamulugeta quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT tesfayeletajule quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT tesfayohanismihretab quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT thenmalars quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT thenmozhi quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT thippeswamygr quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT thirukumarans quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT tiwariswati quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT virmanideepali quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT yadavkamleshkumar quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT yadavsatyaprakash quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity AT yadavvibhash quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity |
status_str |
n |
ids_txt_mv |
(DE-B1597)626716 (OCoLC)1390919443 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2023 English Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2023 Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2023 English Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2023 |
is_hierarchy_title |
Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / |
container_title |
Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1806144596364754944 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11820nam a22015375i 4500</leader><controlfield tag="001">9783110798159</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20240306014423.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">240306t20232023gw fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110798159</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110798159</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)626716</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1390919443</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Quantum-Safe Cryptography Algorithms and Approaches :</subfield><subfield code="b">Impacts of Quantum Computing on Cybersecurity /</subfield><subfield code="c">ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (XVII, 327 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Quantum Computing ,</subfield><subfield code="x">2940-0112</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Biographies -- </subfield><subfield code="t">List of contributors -- </subfield><subfield code="t">1 Optimizing the traffic flow in VANETs using deep quantum annealing -- </subfield><subfield code="t">2 Quantum annealing-based routing in UAV network -- </subfield><subfield code="t">3 Cyberbullying detection of social network tweets using quantum machine learning -- </subfield><subfield code="t">4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network -- </subfield><subfield code="t">5 Machine learning-based quantum modeling to classify the traffic flow in smart cities -- </subfield><subfield code="t">6 IoT attack detection using quantum deep learning in large-scale networks -- </subfield><subfield code="t">7 Quantum transfer learning to detect passive attacks in SDN-IOT -- </subfield><subfield code="t">8 Intrusion detection framework using quantum computing for mobile cloud computing -- </subfield><subfield code="t">9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes -- </subfield><subfield code="t">10 Study of quantum computing for data analytics of predictive and prescriptive analytics models -- </subfield><subfield code="t">11 A review of different techniques and challenges of quantum computing in various applications -- </subfield><subfield code="t">12 Review and significance of cryptography and machine learning in quantum computing -- </subfield><subfield code="t">13 An improved genetic quantum cryptography model for network communication -- </subfield><subfield code="t">14 Code-based post-quantum cryptographic technique: digital signature -- </subfield><subfield code="t">15 Post-quantum cryptography for the detection of injection attacks in small-scale networks -- </subfield><subfield code="t">16 RSA security implementation in quantum computing for a higher resilience -- </subfield><subfield code="t">17 Application of quantum computing for digital forensic investigation -- </subfield><subfield code="t">18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones -- </subfield><subfield code="t">19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system -- </subfield><subfield code="t">20 Mitigating the risk of quantum computing in cyber security era -- </subfield><subfield code="t">21 IoMT-based data aggregation using quantum learning -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. This book presents an overview of all the cross-disciplinary developments in cybersecurity that are being generated by the advancements in quantum computing.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Neural Networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Security.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quantum Computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quantum-safe Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Intelligence (AI) & Semantics.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Artificial Neural Networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Quantum Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Quantum-safe Cryptography.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aggarwal, Alankrita, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Al-Turjman, Fadi, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anuradha, B., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Avasthi, Sandhya, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Balaji, N. Alangudi, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhavadharini, R. M., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chari, V. Dhanunjana, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Devi, B. Aruna, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gaba, Shivani, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Garg, Puneet, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Swati, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hari, K. Sri, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harsha, B. K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karthik, S., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karthikeyan, N., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kavitha, M. S, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kishor, Kausha, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kishor, Kaushal, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kowshika, A., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, M. Sunil, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Swarn Avinash, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumari, Pushpa, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Manisha, Kumari, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mayan, J. Albert, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Menaka, R., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Murthy, G. R. S., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nagpal, Shally, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Palanikkumar, D., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Parveen, H. Summia, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Paul, A. Christopher, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Periyakaruppan, K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prakash, Ayushi, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Preethi, M. P., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Purohit, Nitin, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao, G. Madhava, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao, Ramachandra G., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ravishankar, T. Nadana, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rawat, Mukesh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reddy, G. Swamy, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sabitha, R., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sangeetha, K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saravanan, V., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sathya, R., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sekaran, S. Chandra, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shanthini, J., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shobana, M., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Raghuraj, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sivaprakash, P., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sreelatha, P., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sudhakar, Annapantula, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sumathi, T., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tasisa, Buli Yohannis, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tesema, Mulugeta, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tesfaye, Leta Jule, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tesfayohanis, Mihretab, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thenmalar, S., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thenmozhi,, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thippeswamy, G. R., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thirukumaran, S., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tiwari, Swati, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Virmani, Deepali, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yadav, Kamlesh Kumar, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yadav, Satya Prakash, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yadav, Vibhash, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus DeG Package 2023 Part 1</subfield><subfield code="z">9783111175782</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2023 English</subfield><subfield code="z">9783111319292</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2023</subfield><subfield code="z">9783111318912</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2023 English</subfield><subfield code="z">9783111319124</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2023</subfield><subfield code="z">9783111318165</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110798364</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110798005</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110798159</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110798159</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783110798159/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-117578-2 DG Plus DeG Package 2023 Part 1</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-131912-4 EBOOK PACKAGE Engineering, Computer Sciences 2023 English</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-131929-2 EBOOK PACKAGE COMPLETE 2023 English</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2023</subfield></datafield></record></collection> |