A Primer on Security of Quantum Computing

被引:0
|
作者
Ghosh, Swaroop [1 ]
Upadhyay, Suryansh [1 ]
Saki, Abdullah Ash [2 ]
机构
[1] The Pennsylvania State University, PA, United States
[2] IBM Corporation, NY, United States
来源
arXiv | 2023年
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Denial-of-service attack - Embedded systems - Malware - Network security - Quantum optics - Software testing
引用
收藏
相关论文
共 50 条
  • [41] Why celebrate women in computing?
    Hamdan, Nur Al-Huda
    XRDS: Crossroads, 2015, 22 (02): : 18 - 19
  • [42] COMPUTING SYSTEMS 1974.
    Anon
    1974,
  • [43] Advanced computing for the built environment
    Borrmann, Andre
    Geyer, Philipp
    Koch, Christian
    ADVANCED ENGINEERING INFORMATICS, 2013, 27 (04) : 411 - 412
  • [44] A heuristic approach for computing effects
    University of Freiburg, Germany
    Lect. Notes Comput. Sci., (147-162):
  • [45] Quantum Teleportation using Quantum Candies
    Nunavath, Nikhitha
    Mishra, Sandeep
    Pathak, Anirban
    arXiv,
  • [46] Thermodynamics of quantum trajectories on a quantum computer
    Cech, Marcel
    Lesanovsky, Igor
    Carollo, Federico
    arXiv, 2023,
  • [47] Retraction Note: E-healthcare application cyber security analysis using quantum machine learning in malicious user detection (Optical and Quantum Electronics, (2024), 56, 3, (476), 10.1007/s11082-023-05854-x)
    Department of Information Center, Central Hospital Affiliated to Shenyang Medical College, No. 5, Nanqixi Road, Liaoning Province, Shenyang
    110075, China
    不详
    110001, China
    Opt Quantum Electron, 11
  • [48] Security and Journalism: A Systematic Review
    Mendoza-Ríos, Richard Anderson
    Turriate-Guzman, Adriana Margarita
    Fernández-Saucedo, Yaritza Zarait
    Bravo-Guevara, Dalia Rosa
    del Pilar Segura-Carmona, Norka
    Lecture Notes in Networks and Systems, 2024, 879 : 449 - 457
  • [49] Abstractions for security protocol verification
    Nguyen, Binh Thanh
    Sprenger, Christoph
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 196 - 215
  • [50] The importance of cyber security in journalism
    Sherf, Elad
    Network Security, 2022, 2022 (04):