Results 131 to 140 of about 3,134 (166)

A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]

open access: yesEPJ Quantum Technol
Aquina N   +9 more
europepmc   +1 more source

Genomic privacy and security in the era of artificial intelligence and quantum computing. [PDF]

open access: yesDiscov Comput
Annan R   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy