Quantum-Safe Cryptography Algorithms and Approaches : : Impacts of Quantum Computing on Cybersecurity / / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman.

Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. This book...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1
MitwirkendeR:
HerausgeberIn:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2023]
©2023
Year of Publication:2023
Language:English
Series:Quantum Computing ,
Online Access:
Physical Description:1 online resource (XVII, 327 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9783110798159
ctrlnum (DE-B1597)626716
(OCoLC)1390919443
collection bib_alma
record_format marc
spelling Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman.
Berlin ; Boston : De Gruyter, [2023]
©2023
1 online resource (XVII, 327 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Quantum Computing , 2940-0112
Frontmatter -- Preface -- Contents -- Biographies -- List of contributors -- 1 Optimizing the traffic flow in VANETs using deep quantum annealing -- 2 Quantum annealing-based routing in UAV network -- 3 Cyberbullying detection of social network tweets using quantum machine learning -- 4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network -- 5 Machine learning-based quantum modeling to classify the traffic flow in smart cities -- 6 IoT attack detection using quantum deep learning in large-scale networks -- 7 Quantum transfer learning to detect passive attacks in SDN-IOT -- 8 Intrusion detection framework using quantum computing for mobile cloud computing -- 9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes -- 10 Study of quantum computing for data analytics of predictive and prescriptive analytics models -- 11 A review of different techniques and challenges of quantum computing in various applications -- 12 Review and significance of cryptography and machine learning in quantum computing -- 13 An improved genetic quantum cryptography model for network communication -- 14 Code-based post-quantum cryptographic technique: digital signature -- 15 Post-quantum cryptography for the detection of injection attacks in small-scale networks -- 16 RSA security implementation in quantum computing for a higher resilience -- 17 Application of quantum computing for digital forensic investigation -- 18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones -- 19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system -- 20 Mitigating the risk of quantum computing in cyber security era -- 21 IoMT-based data aggregation using quantum learning -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. This book presents an overview of all the cross-disciplinary developments in cybersecurity that are being generated by the advancements in quantum computing.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024)
Artificial Neural Networks.
Information Security.
Quantum Computing.
Quantum-safe Cryptography.
COMPUTERS / Intelligence (AI) & Semantics. bisacsh
Information security.
Aggarwal, Alankrita, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Al-Turjman, Fadi, editor. edt http://id.loc.gov/vocabulary/relators/edt
Anuradha, B., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Avasthi, Sandhya, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Balaji, N. Alangudi, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Bhavadharini, R. M., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Chari, V. Dhanunjana, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Devi, B. Aruna, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Gaba, Shivani, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Garg, Puneet, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Gupta, Swati, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Hari, K. Sri, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Harsha, B. K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Karthik, S., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Karthikeyan, N., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kavitha, M. S, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kishor, Kausha, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kishor, Kaushal, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kowshika, A., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar, M. Sunil, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar, Swarn Avinash, editor. edt http://id.loc.gov/vocabulary/relators/edt
Kumari, Pushpa, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Manisha, Kumari, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Mayan, J. Albert, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Menaka, R., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Murthy, G. R. S., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Nagpal, Shally, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Palanikkumar, D., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Parveen, H. Summia, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Paul, A. Christopher, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Periyakaruppan, K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Prakash, Ayushi, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Preethi, M. P., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Purohit, Nitin, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Rao, G. Madhava, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Rao, Ramachandra G., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Ravishankar, T. Nadana, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Rawat, Mukesh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Reddy, G. Swamy, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sabitha, R., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sangeetha, K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Saravanan, V., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sathya, R., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sekaran, S. Chandra, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Shanthini, J., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Shobana, M., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Singh, Raghuraj, editor. edt http://id.loc.gov/vocabulary/relators/edt
Sivaprakash, P., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sreelatha, P., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sudhakar, Annapantula, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sumathi, T., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Tasisa, Buli Yohannis, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Tesema, Mulugeta, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Tesfaye, Leta Jule, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Tesfayohanis, Mihretab, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Thenmalar, S., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Thenmozhi,, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Thippeswamy, G. R., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Thirukumaran, S., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Tiwari, Swati, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Virmani, Deepali, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Yadav, Kamlesh Kumar, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Yadav, Satya Prakash, editor. edt http://id.loc.gov/vocabulary/relators/edt
Yadav, Vibhash, editor. edt http://id.loc.gov/vocabulary/relators/edt
Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 9783111175782
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2023 English 9783111319292
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2023 9783111318912 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2023 English 9783111319124
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2023 9783111318165 ZDB-23-DEI
EPUB 9783110798364
print 9783110798005
https://doi.org/10.1515/9783110798159
https://www.degruyter.com/isbn/9783110798159
Cover https://www.degruyter.com/document/cover/isbn/9783110798159/original
language English
format eBook
author2 Aggarwal, Alankrita,
Aggarwal, Alankrita,
Al-Turjman, Fadi,
Al-Turjman, Fadi,
Anuradha, B.,
Anuradha, B.,
Avasthi, Sandhya,
Avasthi, Sandhya,
Balaji, N. Alangudi,
Balaji, N. Alangudi,
Bhavadharini, R. M.,
Bhavadharini, R. M.,
Chari, V. Dhanunjana,
Chari, V. Dhanunjana,
Devi, B. Aruna,
Devi, B. Aruna,
Gaba, Shivani,
Gaba, Shivani,
Garg, Puneet,
Garg, Puneet,
Gupta, Swati,
Gupta, Swati,
Hari, K. Sri,
Hari, K. Sri,
Harsha, B. K.,
Harsha, B. K.,
Karthik, S.,
Karthik, S.,
Karthikeyan, N.,
Karthikeyan, N.,
Kavitha, M. S,
Kavitha, M. S,
Kishor, Kausha,
Kishor, Kausha,
Kishor, Kaushal,
Kishor, Kaushal,
Kowshika, A.,
Kowshika, A.,
Kumar, M. Sunil,
Kumar, M. Sunil,
Kumar, Swarn Avinash,
Kumar, Swarn Avinash,
Kumari, Pushpa,
Kumari, Pushpa,
Manisha, Kumari,
Manisha, Kumari,
Mayan, J. Albert,
Mayan, J. Albert,
Menaka, R.,
Menaka, R.,
Murthy, G. R. S.,
Murthy, G. R. S.,
Nagpal, Shally,
Nagpal, Shally,
Palanikkumar, D.,
Palanikkumar, D.,
Parveen, H. Summia,
Parveen, H. Summia,
Paul, A. Christopher,
Paul, A. Christopher,
Periyakaruppan, K.,
Periyakaruppan, K.,
Prakash, Ayushi,
Prakash, Ayushi,
Preethi, M. P.,
Preethi, M. P.,
Purohit, Nitin,
Purohit, Nitin,
Rao, G. Madhava,
Rao, G. Madhava,
Rao, Ramachandra G.,
Rao, Ramachandra G.,
Ravishankar, T. Nadana,
Ravishankar, T. Nadana,
Rawat, Mukesh,
Rawat, Mukesh,
Reddy, G. Swamy,
Reddy, G. Swamy,
Sabitha, R.,
Sabitha, R.,
Sangeetha, K.,
Sangeetha, K.,
Saravanan, V.,
Saravanan, V.,
Sathya, R.,
Sathya, R.,
Sekaran, S. Chandra,
Sekaran, S. Chandra,
Shanthini, J.,
Shanthini, J.,
Shobana, M.,
Shobana, M.,
Singh, Raghuraj,
Singh, Raghuraj,
Sivaprakash, P.,
Sivaprakash, P.,
Sreelatha, P.,
Sreelatha, P.,
Sudhakar, Annapantula,
Sudhakar, Annapantula,
Sumathi, T.,
Sumathi, T.,
Tasisa, Buli Yohannis,
Tasisa, Buli Yohannis,
Tesema, Mulugeta,
Tesema, Mulugeta,
Tesfaye, Leta Jule,
Tesfaye, Leta Jule,
Tesfayohanis, Mihretab,
Tesfayohanis, Mihretab,
Thenmalar, S.,
Thenmalar, S.,
Thenmozhi,,
Thenmozhi,,
Thippeswamy, G. R.,
Thippeswamy, G. R.,
Thirukumaran, S.,
Thirukumaran, S.,
Tiwari, Swati,
Tiwari, Swati,
Virmani, Deepali,
Virmani, Deepali,
Yadav, Kamlesh Kumar,
Yadav, Kamlesh Kumar,
Yadav, Satya Prakash,
Yadav, Satya Prakash,
Yadav, Vibhash,
Yadav, Vibhash,
author_facet Aggarwal, Alankrita,
Aggarwal, Alankrita,
Al-Turjman, Fadi,
Al-Turjman, Fadi,
Anuradha, B.,
Anuradha, B.,
Avasthi, Sandhya,
Avasthi, Sandhya,
Balaji, N. Alangudi,
Balaji, N. Alangudi,
Bhavadharini, R. M.,
Bhavadharini, R. M.,
Chari, V. Dhanunjana,
Chari, V. Dhanunjana,
Devi, B. Aruna,
Devi, B. Aruna,
Gaba, Shivani,
Gaba, Shivani,
Garg, Puneet,
Garg, Puneet,
Gupta, Swati,
Gupta, Swati,
Hari, K. Sri,
Hari, K. Sri,
Harsha, B. K.,
Harsha, B. K.,
Karthik, S.,
Karthik, S.,
Karthikeyan, N.,
Karthikeyan, N.,
Kavitha, M. S,
Kavitha, M. S,
Kishor, Kausha,
Kishor, Kausha,
Kishor, Kaushal,
Kishor, Kaushal,
Kowshika, A.,
Kowshika, A.,
Kumar, M. Sunil,
Kumar, M. Sunil,
Kumar, Swarn Avinash,
Kumar, Swarn Avinash,
Kumari, Pushpa,
Kumari, Pushpa,
Manisha, Kumari,
Manisha, Kumari,
Mayan, J. Albert,
Mayan, J. Albert,
Menaka, R.,
Menaka, R.,
Murthy, G. R. S.,
Murthy, G. R. S.,
Nagpal, Shally,
Nagpal, Shally,
Palanikkumar, D.,
Palanikkumar, D.,
Parveen, H. Summia,
Parveen, H. Summia,
Paul, A. Christopher,
Paul, A. Christopher,
Periyakaruppan, K.,
Periyakaruppan, K.,
Prakash, Ayushi,
Prakash, Ayushi,
Preethi, M. P.,
Preethi, M. P.,
Purohit, Nitin,
Purohit, Nitin,
Rao, G. Madhava,
Rao, G. Madhava,
Rao, Ramachandra G.,
Rao, Ramachandra G.,
Ravishankar, T. Nadana,
Ravishankar, T. Nadana,
Rawat, Mukesh,
Rawat, Mukesh,
Reddy, G. Swamy,
Reddy, G. Swamy,
Sabitha, R.,
Sabitha, R.,
Sangeetha, K.,
Sangeetha, K.,
Saravanan, V.,
Saravanan, V.,
Sathya, R.,
Sathya, R.,
Sekaran, S. Chandra,
Sekaran, S. Chandra,
Shanthini, J.,
Shanthini, J.,
Shobana, M.,
Shobana, M.,
Singh, Raghuraj,
Singh, Raghuraj,
Sivaprakash, P.,
Sivaprakash, P.,
Sreelatha, P.,
Sreelatha, P.,
Sudhakar, Annapantula,
Sudhakar, Annapantula,
Sumathi, T.,
Sumathi, T.,
Tasisa, Buli Yohannis,
Tasisa, Buli Yohannis,
Tesema, Mulugeta,
Tesema, Mulugeta,
Tesfaye, Leta Jule,
Tesfaye, Leta Jule,
Tesfayohanis, Mihretab,
Tesfayohanis, Mihretab,
Thenmalar, S.,
Thenmalar, S.,
Thenmozhi,,
Thenmozhi,,
Thippeswamy, G. R.,
Thippeswamy, G. R.,
Thirukumaran, S.,
Thirukumaran, S.,
Tiwari, Swati,
Tiwari, Swati,
Virmani, Deepali,
Virmani, Deepali,
Yadav, Kamlesh Kumar,
Yadav, Kamlesh Kumar,
Yadav, Satya Prakash,
Yadav, Satya Prakash,
Yadav, Vibhash,
Yadav, Vibhash,
author2_variant a a aa
a a aa
f a t fat
f a t fat
b a ba
b a ba
s a sa
s a sa
n a b na nab
n a b na nab
r m b rm rmb
r m b rm rmb
v d c vd vdc
v d c vd vdc
b a d ba bad
b a d ba bad
s g sg
s g sg
p g pg
p g pg
s g sg
s g sg
k s h ks ksh
k s h ks ksh
b k h bk bkh
b k h bk bkh
s k sk
s k sk
n k nk
n k nk
m s k ms msk
m s k ms msk
k k kk
k k kk
k k kk
k k kk
a k ak
a k ak
m s k ms msk
m s k ms msk
s a k sa sak
s a k sa sak
p k pk
p k pk
k m km
k m km
j a m ja jam
j a m ja jam
r m rm
r m rm
g r s m grs grsm
g r s m grs grsm
s n sn
s n sn
d p dp
d p dp
h s p hs hsp
h s p hs hsp
a c p ac acp
a c p ac acp
k p kp
k p kp
a p ap
a p ap
m p p mp mpp
m p p mp mpp
n p np
n p np
g m r gm gmr
g m r gm gmr
r g r rg rgr
r g r rg rgr
t n r tn tnr
t n r tn tnr
m r mr
m r mr
g s r gs gsr
g s r gs gsr
r s rs
r s rs
k s ks
k s ks
v s vs
v s vs
r s rs
r s rs
s c s sc scs
s c s sc scs
j s js
j s js
m s ms
m s ms
r s rs
r s rs
p s ps
p s ps
p s ps
p s ps
a s as
a s as
t s ts
t s ts
b y t by byt
b y t by byt
m t mt
m t mt
l j t lj ljt
l j t lj ljt
m t mt
m t mt
s t st
s t st
t
t
g r t gr grt
g r t gr grt
s t st
s t st
s t st
s t st
d v dv
d v dv
k k y kk kky
k k y kk kky
s p y sp spy
s p y sp spy
v y vy
v y vy
author2_role MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
author_sort Aggarwal, Alankrita,
title Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity /
spellingShingle Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity /
Quantum Computing ,
Frontmatter --
Preface --
Contents --
Biographies --
List of contributors --
1 Optimizing the traffic flow in VANETs using deep quantum annealing --
2 Quantum annealing-based routing in UAV network --
3 Cyberbullying detection of social network tweets using quantum machine learning --
4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network --
5 Machine learning-based quantum modeling to classify the traffic flow in smart cities --
6 IoT attack detection using quantum deep learning in large-scale networks --
7 Quantum transfer learning to detect passive attacks in SDN-IOT --
8 Intrusion detection framework using quantum computing for mobile cloud computing --
9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes --
10 Study of quantum computing for data analytics of predictive and prescriptive analytics models --
11 A review of different techniques and challenges of quantum computing in various applications --
12 Review and significance of cryptography and machine learning in quantum computing --
13 An improved genetic quantum cryptography model for network communication --
14 Code-based post-quantum cryptographic technique: digital signature --
15 Post-quantum cryptography for the detection of injection attacks in small-scale networks --
16 RSA security implementation in quantum computing for a higher resilience --
17 Application of quantum computing for digital forensic investigation --
18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones --
19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system --
20 Mitigating the risk of quantum computing in cyber security era --
21 IoMT-based data aggregation using quantum learning --
Index
title_sub Impacts of Quantum Computing on Cybersecurity /
title_full Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman.
title_fullStr Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman.
title_full_unstemmed Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity / ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman.
title_auth Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity /
title_alt Frontmatter --
Preface --
Contents --
Biographies --
List of contributors --
1 Optimizing the traffic flow in VANETs using deep quantum annealing --
2 Quantum annealing-based routing in UAV network --
3 Cyberbullying detection of social network tweets using quantum machine learning --
4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network --
5 Machine learning-based quantum modeling to classify the traffic flow in smart cities --
6 IoT attack detection using quantum deep learning in large-scale networks --
7 Quantum transfer learning to detect passive attacks in SDN-IOT --
8 Intrusion detection framework using quantum computing for mobile cloud computing --
9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes --
10 Study of quantum computing for data analytics of predictive and prescriptive analytics models --
11 A review of different techniques and challenges of quantum computing in various applications --
12 Review and significance of cryptography and machine learning in quantum computing --
13 An improved genetic quantum cryptography model for network communication --
14 Code-based post-quantum cryptographic technique: digital signature --
15 Post-quantum cryptography for the detection of injection attacks in small-scale networks --
16 RSA security implementation in quantum computing for a higher resilience --
17 Application of quantum computing for digital forensic investigation --
18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones --
19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system --
20 Mitigating the risk of quantum computing in cyber security era --
21 IoMT-based data aggregation using quantum learning --
Index
title_new Quantum-Safe Cryptography Algorithms and Approaches :
title_sort quantum-safe cryptography algorithms and approaches : impacts of quantum computing on cybersecurity /
series Quantum Computing ,
series2 Quantum Computing ,
publisher De Gruyter,
publishDate 2023
physical 1 online resource (XVII, 327 p.)
Issued also in print.
contents Frontmatter --
Preface --
Contents --
Biographies --
List of contributors --
1 Optimizing the traffic flow in VANETs using deep quantum annealing --
2 Quantum annealing-based routing in UAV network --
3 Cyberbullying detection of social network tweets using quantum machine learning --
4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network --
5 Machine learning-based quantum modeling to classify the traffic flow in smart cities --
6 IoT attack detection using quantum deep learning in large-scale networks --
7 Quantum transfer learning to detect passive attacks in SDN-IOT --
8 Intrusion detection framework using quantum computing for mobile cloud computing --
9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes --
10 Study of quantum computing for data analytics of predictive and prescriptive analytics models --
11 A review of different techniques and challenges of quantum computing in various applications --
12 Review and significance of cryptography and machine learning in quantum computing --
13 An improved genetic quantum cryptography model for network communication --
14 Code-based post-quantum cryptographic technique: digital signature --
15 Post-quantum cryptography for the detection of injection attacks in small-scale networks --
16 RSA security implementation in quantum computing for a higher resilience --
17 Application of quantum computing for digital forensic investigation --
18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones --
19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system --
20 Mitigating the risk of quantum computing in cyber security era --
21 IoMT-based data aggregation using quantum learning --
Index
isbn 9783110798159
9783111175782
9783111319292
9783111318912
9783111319124
9783111318165
9783110798364
9783110798005
issn 2940-0112
url https://doi.org/10.1515/9783110798159
https://www.degruyter.com/isbn/9783110798159
https://www.degruyter.com/document/cover/isbn/9783110798159/original
illustrated Not Illustrated
doi_str_mv 10.1515/9783110798159
oclc_num 1390919443
work_keys_str_mv AT aggarwalalankrita quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT alturjmanfadi quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT anuradhab quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT avasthisandhya quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT balajinalangudi quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT bhavadharinirm quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT charivdhanunjana quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT devibaruna quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT gabashivani quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT gargpuneet quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT guptaswati quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT hariksri quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT harshabk quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT karthiks quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT karthikeyann quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT kavithams quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT kishorkausha quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT kishorkaushal quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT kowshikaa quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT kumarmsunil quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT kumarswarnavinash quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT kumaripushpa quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT manishakumari quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT mayanjalbert quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT menakar quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT murthygrs quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT nagpalshally quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT palanikkumard quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT parveenhsummia quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT paulachristopher quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT periyakaruppank quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT prakashayushi quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT preethimp quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT purohitnitin quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT raogmadhava quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT raoramachandrag quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT ravishankartnadana quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT rawatmukesh quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT reddygswamy quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT sabithar quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT sangeethak quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT saravananv quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT sathyar quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT sekaranschandra quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT shanthinij quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT shobanam quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT singhraghuraj quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT sivaprakashp quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT sreelathap quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT sudhakarannapantula quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT sumathit quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT tasisabuliyohannis quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT tesemamulugeta quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT tesfayeletajule quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT tesfayohanismihretab quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT thenmalars quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT thenmozhi quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT thippeswamygr quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT thirukumarans quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT tiwariswati quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT virmanideepali quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT yadavkamleshkumar quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT yadavsatyaprakash quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
AT yadavvibhash quantumsafecryptographyalgorithmsandapproachesimpactsofquantumcomputingoncybersecurity
status_str n
ids_txt_mv (DE-B1597)626716
(OCoLC)1390919443
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2023 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2023
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2023 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2023
is_hierarchy_title Quantum-Safe Cryptography Algorithms and Approaches : Impacts of Quantum Computing on Cybersecurity /
container_title Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1806144596364754944
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11820nam a22015375i 4500</leader><controlfield tag="001">9783110798159</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20240306014423.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">240306t20232023gw fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110798159</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110798159</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)626716</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1390919443</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Quantum-Safe Cryptography Algorithms and Approaches :</subfield><subfield code="b">Impacts of Quantum Computing on Cybersecurity /</subfield><subfield code="c">ed. by Satya Prakash Yadav, Raghuraj Singh, Vibhash Yadav, Swarn Avinash Kumar, Fadi Al-Turjman.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (XVII, 327 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Quantum Computing ,</subfield><subfield code="x">2940-0112</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Biographies -- </subfield><subfield code="t">List of contributors -- </subfield><subfield code="t">1 Optimizing the traffic flow in VANETs using deep quantum annealing -- </subfield><subfield code="t">2 Quantum annealing-based routing in UAV network -- </subfield><subfield code="t">3 Cyberbullying detection of social network tweets using quantum machine learning -- </subfield><subfield code="t">4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network -- </subfield><subfield code="t">5 Machine learning-based quantum modeling to classify the traffic flow in smart cities -- </subfield><subfield code="t">6 IoT attack detection using quantum deep learning in large-scale networks -- </subfield><subfield code="t">7 Quantum transfer learning to detect passive attacks in SDN-IOT -- </subfield><subfield code="t">8 Intrusion detection framework using quantum computing for mobile cloud computing -- </subfield><subfield code="t">9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes -- </subfield><subfield code="t">10 Study of quantum computing for data analytics of predictive and prescriptive analytics models -- </subfield><subfield code="t">11 A review of different techniques and challenges of quantum computing in various applications -- </subfield><subfield code="t">12 Review and significance of cryptography and machine learning in quantum computing -- </subfield><subfield code="t">13 An improved genetic quantum cryptography model for network communication -- </subfield><subfield code="t">14 Code-based post-quantum cryptographic technique: digital signature -- </subfield><subfield code="t">15 Post-quantum cryptography for the detection of injection attacks in small-scale networks -- </subfield><subfield code="t">16 RSA security implementation in quantum computing for a higher resilience -- </subfield><subfield code="t">17 Application of quantum computing for digital forensic investigation -- </subfield><subfield code="t">18 Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones -- </subfield><subfield code="t">19 Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system -- </subfield><subfield code="t">20 Mitigating the risk of quantum computing in cyber security era -- </subfield><subfield code="t">21 IoMT-based data aggregation using quantum learning -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. This book presents an overview of all the cross-disciplinary developments in cybersecurity that are being generated by the advancements in quantum computing.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Neural Networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Security.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quantum Computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quantum-safe Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Intelligence (AI) &amp; Semantics.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Artificial Neural Networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Quantum Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Quantum-safe Cryptography.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aggarwal, Alankrita, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Al-Turjman, Fadi, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anuradha, B., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Avasthi, Sandhya, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Balaji, N. Alangudi, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhavadharini, R. M., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chari, V. Dhanunjana, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Devi, B. Aruna, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gaba, Shivani, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Garg, Puneet, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Swati, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hari, K. Sri, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harsha, B. K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karthik, S., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karthikeyan, N., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kavitha, M. S, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kishor, Kausha, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kishor, Kaushal, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kowshika, A., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, M. Sunil, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Swarn Avinash, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumari, Pushpa, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Manisha, Kumari, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mayan, J. Albert, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Menaka, R., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Murthy, G. R. S., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nagpal, Shally, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Palanikkumar, D., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Parveen, H. Summia, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Paul, A. Christopher, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Periyakaruppan, K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prakash, Ayushi, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Preethi, M. P., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Purohit, Nitin, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao, G. Madhava, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao, Ramachandra G., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ravishankar, T. Nadana, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rawat, Mukesh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reddy, G. Swamy, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sabitha, R., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sangeetha, K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saravanan, V., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sathya, R., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sekaran, S. Chandra, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shanthini, J., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shobana, M., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Raghuraj, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sivaprakash, P., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sreelatha, P., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sudhakar, Annapantula, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sumathi, T., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tasisa, Buli Yohannis, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tesema, Mulugeta, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tesfaye, Leta Jule, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tesfayohanis, Mihretab, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thenmalar, S., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thenmozhi,, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thippeswamy, G. R., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thirukumaran, S., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tiwari, Swati, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Virmani, Deepali, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yadav, Kamlesh Kumar, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yadav, Satya Prakash, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yadav, Vibhash, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus DeG Package 2023 Part 1</subfield><subfield code="z">9783111175782</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2023 English</subfield><subfield code="z">9783111319292</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2023</subfield><subfield code="z">9783111318912</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2023 English</subfield><subfield code="z">9783111319124</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2023</subfield><subfield code="z">9783111318165</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110798364</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110798005</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110798159</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110798159</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783110798159/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-117578-2 DG Plus DeG Package 2023 Part 1</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-131912-4 EBOOK PACKAGE Engineering, Computer Sciences 2023 English</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-131929-2 EBOOK PACKAGE COMPLETE 2023 English</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2023</subfield></datafield></record></collection>