<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="17499" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/17499?output=omeka-xml" accessDate="2026-04-29T05:42:46+00:00">
  <collection collectionId="15">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="44496">
                <text>Book Chapter</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="27">
    <name>Book Chapter</name>
    <description>Faculty Publications- Book Chapter</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="141410">
              <text>Safeguarding the future through the prevention of cybercrime in the quantum computing era</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="141411">
              <text>Quantum computing is an emerging field that holds great promise for solving complex problems at an unprecedented speed by harnessing the principles of quantum mechanics. However, this disruptive technology also introduces new challenges, particularly in the realm of cybersecurity. Quantum computing can lead to cyberattacks such as cryptographic attacks, data breaches, blockchain vulnerabilities, social engineering, and phishing attacks. It is important to note that, at present, these risks are largely theoretical, as practical, large-scale quantum computers capable of breaking current cryptographic systems are not yet available. However, it is crucial for researchers, organisations, and policymakers to anticipate and address these potential threats in advance by developing quantum-resistant cryptographic algorithms, improving security protocols, and raising awareness about the evolving landscape of cyberthreats in the quantum computing era. There is a need for preparing safeguard measures form the quantum threat by investing in quantum-safe technologies, training cybersecurity professionals in quantum-resistant techniques, and fostering collaboration among industry, academia, and government entities. As quantum computing progresses, the landscape of cybercrime is expected to evolve, necessitating the development of robust laws to mitigate potential threats. The chapter aims at understanding the intersection of quantum computing and cybercrime, highlighting the potential implications and risks associated with quantum advancements in the context of cybersecurity. The chapter also emphasises the need for proactive measures and policies to mitigate the risks posed by quantum computing to cybersecurity.  2025 selection and editorial matter, Keshav Kumar and Bishwajeet Kumar Pandey; individual chapters, the contributors.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="141412">
              <text>Divyashree K.S.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="141413">
              <text>Next Generation Mechanisms for Data Encryption, pp. 258-276.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="141414">
              <text>CRC Press</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="141415">
              <text>2025-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="141416">
              <text>&lt;a href="https://doi.org/10.1201/9781003508632-17" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1201/9781003508632-17&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85213499323&amp;amp;doi=10.1201%2F9781003508632-17&amp;amp;partnerID=40&amp;amp;md5=3308593d0729b705fbf4e967ec40f803" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85213499323&amp;amp;doi=10.1201%2f9781003508632-17&amp;amp;partnerID=40&amp;amp;md5=3308593d0729b705fbf4e967ec40f803&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="141417">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="141418">
              <text>ISBN: 978-104027111-7; 978-103283284-5</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="141419">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="141420">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="141421">
              <text>Book chapter</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="141422">
              <text>Divyashree K.S., Christ University, Bengaluru, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
