Results 81 to 90 of about 1,613,397 (323)

New Trends in Quantum Computing

open access: yes, 1996
Classical and quantum information are very different. Together they can perform feats that neither could achieve alone, such as quantum computing, quantum cryptography and quantum teleportation.
Brassard, Gilles
core   +2 more sources

Toward Knowledge‐Based Workflows: A Semantic Approach to Atomistic Simulations for Mechanical and Thermodynamic Properties

open access: yesAdvanced Engineering Materials, EarlyView.
Knowledge‐based atomistic workflows are presented for mechanical and thermodynamic properties. By coupling modular simulations with ontology‐aligned metadata and provenance, Fe case studies on elastic behavior, defects, thermal properties, and Hall–Petch strengthening reveal how FAIR, queryable, and reusable simulation data can be generated. Mechanical
Abril Azócar Guzmán   +5 more
wiley   +1 more source

QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY

open access: yesComputer Science & IT Research Journal
This study provides a comprehensive review of quantum cryptography and its implications for U.S. national security in the face of emerging quantum technologies.
Sedat Sonko   +4 more
semanticscholar   +1 more source

Quantum Cryptography-as-a-Service for Secure UAV Communication: Applications, Challenges, and Case Study

open access: yesIEEE Access, 2022
The sudden demand rises in security made researchers come up with solutions that provide instantaneous safety better than the state of the art solutions. The quest for securing data began in the Spartan era. People are now looking to expand this field of
Vishakha K. Ralegankar   +6 more
semanticscholar   +1 more source

Cathodic Cage Plasma Deposition of Nanostructured Cu–Fe–Se Coatings on Poly(methyl Methacrylate)

open access: yesAdvanced Engineering Materials, EarlyView.
Nanostructured Cu–Fe–Se coatings are deposited on PMMA by a modified cathodic cage plasma process, enabling low‐temperature deposition on polymer substrates. A transition from discontinuous to compact morphology is observed with temperature, with optimal properties at 200°C, where improved CuFeSe2‐type bonding, lowest sheet resistance, and favorable ...
V. S. S. Sobrinho   +8 more
wiley   +1 more source

A proposal for founding mistrustful quantum cryptography on coin tossing

open access: yes, 2003
A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process or exchange information.
A. Kent   +7 more
core   +1 more source

Quantum Cryptography Without Switching [PDF]

open access: yesPhysical Review Letters, 2004
We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements.
Weedbrook, C.   +5 more
openaire   +6 more sources

An Experimental High‐Throughput Approach for the Screening of Hard Magnet Materials

open access: yesAdvanced Engineering Materials, EarlyView.
An entire workflow for the high‐throughput characterization and analysis of compositionally graded magnetic films is presented. Characterization protocols, data management tools and data analysis approaches are illustrated with test case Sm(Fe, V)12 based films.
William Rigaut   +16 more
wiley   +1 more source

Advancing Secure Communication in the Quantum Era through the Integration of Artificial Intelligence and Quantum Cryptographic Techniques: Author's Country: India

open access: yesBuana Information Technology and Computer Sciences
Utilizing the ideas of quantum physics, quantum cryptography is quickly becoming a vital defense against the growing cybersecurity risks of the contemporary day, especially in light of developing quantum computing.
Hemant N Chaudhari   +2 more
doaj   +1 more source

Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

open access: yesIEEE Open Journal of the Communications Society
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy