FindBook      Google Book      Amazon      博客來     
  • Sustainable security practices using blockchain, quantum and post-quantum technologies for real time applications
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Sustainable security practices using blockchain, quantum and post-quantum technologies for real time applications/ edited by Adarsh Kumar ... [et al.].
    其他作者: Kumar, Adarsh.
    出版者: Singapore :Springer Nature Singapore : : 2024.,
    面頁冊數: xii, 314 p. :ill., digital ;24 cm.
    內容註: Chapter 1 Blockchain-based Privacy-Protected Reputation Model for Internet of Vehicles -- Chapter 2 Sustainable Blockchain and Supply Chain Management: Integration Issues, Challenges, Potentials and Applications -- Chapter 3 Zero-Knowledge Proofs in Blockchain-Enabled Supply Chain Management -- Chapter 4 A Sustainable Blockchain and Asymmetric Broadcast Encryption-based Secure e-healthcare System -- Chapter 5 Computational Analysis of Interference for Sustainable Operation of Wireless Networks -- Chapter 6 Advanced Techniques for Digital Evidence Preservation: The Power of Blockchain and Machine Learning -- Chapter 7 Quantum Resilience and Distributed Trust: The Promise of Blockchain and Quantum Computing in Defense -- Chapter 8 Integration of Blockchain and the Internet of Things in Healthcare Sector -- Chapter 9 Quantum-Resistant Cryptography to Prevent from Phishing Attack Exploiting Blockchain Wallet -- Chapter 10 Revolutionizing Military Technology: How the Fusion of BlockChain and Quantum Computing is Driving in Defense Application -- Chapter 11 Building Resilient Digital Forensic Frameworks for NoSQL Database: Harnessing the Blockchain and Quantum Technology -- Chapter 12 Revolutionising Gait Analysis with Blockchain Technology: Enhancing the Privacy and Security -- Chapter 13 A Blockchain-enabled Framework to Implement Supply Chains in Digital Land Registry in the Kingdom of Saudi Arabia -- Chapter 14 Blockchain for Secure Payments: A Bibliometric Review -- Chapter 15 Formalized overview of ZX-calculus, the notion of completeness clifford computation-based and one representative application case.
    Contained By: Springer Nature eBook
    標題: Computer security. -
    電子資源: https://doi.org/10.1007/978-981-97-0088-2
    ISBN: 9789819700882
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入