Post Quantum Cryptography Algorithms And Approaches For Iot And Blockchain Security


Download Post Quantum Cryptography Algorithms And Approaches For Iot And Blockchain Security PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Post Quantum Cryptography Algorithms And Approaches For Iot And Blockchain Security book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Post-Quantum Cryptography Algorithms and Approaches for IoT and Blockchain Security


Post-Quantum Cryptography Algorithms and Approaches for IoT and Blockchain Security

Author:

language: en

Publisher: Academic Press

Release Date: 2025-05-02


DOWNLOAD





Post-Quantum Cryptography Algorithms and Approaches for IoT and Blockchain Security, Volume 138 the latest release in the Advances in Computers series, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. Chapters in this new release include Quantum-safe Cryptography Approaches and Algorithms, Quantum Computing : An introduction, BPSK-BRO Framework for avoiding side channel attacks and multiphoton attacks in Quantum Key Distribution, Post-Quantum Cryptography Algorithms and Approaches for IoT and Blockchain Security-Chapter -Delineating the Blockchain Paradigm, Post Quantum Cryptographic approach for IoT Security, and more.Other chapters cover Post-Quantum Lightweight Cryptography Algorithms and Approaches for IoT and Blockchain Security, Quantum-enabled machine learning of Random Forest and Discrete Wavelet Transform for cryptographic technique, Delineating the Blockchain Paradigm, Significance of Post Quantum Cryptosystems in Internet of Medical Things (IoMT, Blockchain-inspired Decentralized Applications and Smart Contracts, and much more. - Provides in-depth surveys and tutorials on new computer technology, with this release focusing on Post-Quantum Cryptography Algorithms - Presents well-known authors and researchers in the field - Includes volumes that are devoted to single themes or subfields of computer science

Energy-Efficient Deep Learning Approaches in IoT, Fog, and Green Blockchain Revolution


Energy-Efficient Deep Learning Approaches in IoT, Fog, and Green Blockchain Revolution

Author: Sathio, Anwar Ali

language: en

Publisher: IGI Global

Release Date: 2025-04-18


DOWNLOAD





The convergence of Internet of Things (IoT), fog computing, and blockchain technology can be used to revolutionize energy efficiency and sustainability. The implementation of deep learning (DL) techniques may optimize the energy consumption of these interconnected systems. Thus, they can be used to create green, energy-efficient solutions for various industries, including smart cities, healthcare, finance, and industrial IoT (IIoT). Focusing on the energy efficiency and environmental impact of these technologies, they provide valuable insights into creating sustainable and scalable systems. Energy-Efficient Deep Learning Approaches in IoT, Fog, and Green Blockchain Revolution bridges the knowledge gap between traditional IoT and blockchain research and the emerging need for energy-efficient and green technologies. It influences future research directions, encourages collaboration across disciplines, and inspires innovations that prioritize sustainability. Covering topics such as software-defined networking (SDN), ecosystem conservation, and monitoring systems, this book is an excellent resource for computer scientists, policymakers, technologists, industry practitioners, engineers, environmentalists, sustainability advocates, professionals, researchers, scholars, academicians, and more.

Quantum-Safe Cryptography Algorithms and Approaches


Quantum-Safe Cryptography Algorithms and Approaches

Author: Satya Prakash Yadav

language: en

Publisher: Walter de Gruyter GmbH & Co KG

Release Date: 2023-08-07


DOWNLOAD





Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. This book presents an overview of all the cross-disciplinary developments in cybersecurity that are being generated by the advancements in quantum computing.