Results 51 to 60 of about 3,134 (166)
The rapid increase in the number of internet of things (IoT) devices in the healthcare sector has produced an ecosystem of multimodal data that includes physiological signals, behavioral measurements, and electronic health records. Nevertheless, centralized analytics are dangerous to the privacy and safety of patient data.
Ravikumar R. N. +4 more
wiley +1 more source
Statistical Complexity of Quantum Learning
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi +3 more
wiley +1 more source
Post Quantum Cryptography on Healthcare Security: Safeguarding Patient Data in Medical Systems [PDF]
Quantum computers are capable of solving problems that classical computers cannot, particularly in the realm of cryptographic algorithms such as RSA, DSA, and ECC.
Kumar, Shubham
core +2 more sources
Quantum-resistant Transport Layer Security [PDF]
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology.
Guilley, Sylvain +6 more
core +3 more sources
Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution [PDF]
Once a cryptographically relevant quantum computer is built, confidential information that is communicated today can be decrypted and exposed. Key exchange methods currently used can then be broken and the key used to protect the data can be recovered ...
Aquina, Nick +2 more
core +2 more sources
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
Post-Quantum Migration of the Tor Application
The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt ...
Denis Berger +2 more
doaj +1 more source
With the emergence of quantum computers, classical cryptography is facing significant challenges. Address this compelling problem, it is the need of hour to develop Post Quantum cryptography (PQC), or quantum-resistant cryptography.
Taniya Hasija +3 more
doaj +1 more source
The transition to post-quantum cryptography (PQC) marks a pivotal shift in ensuring digital security, prompted by the potential of quantum computers to compromise classical systems such as Rivest-Shamir-Adlema and elliptic-curve cryptography. In response,
Quang Dang Truong +3 more
doaj +1 more source

