[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tan et al., 2023 - Google Patents

Post-Quantum Adversarial Modeling: A User's Perspective

Tan et al., 2023

View PDF
Document ID
17140394959696428379
Author
Tan T
Zhou J
Sharma V
Mohanty S
Publication year
Publication venue
Computer

External Links

Snippet

What are adversaries doing to prepare for the impending arrival of quantum computers? We take an adversarial modeling approach to identify various personas and flesh out passive and active actions such adversaries can take to gain an advantage, before providing …
Continue reading at pureadmin.qub.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements

Similar Documents

Publication Publication Date Title
Alghofaili et al. Secure cloud infrastructure: A survey on issues, current solutions, and open challenges
Swire et al. Encryption and globalization
Kafi et al. Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection
Rao et al. The InfoSec handbook: An introduction to information security
US20230412626A1 (en) Systems and methods for cyber security and quantum encapsulation for smart cities and the internet of things
Dawood et al. Cyberattacks and security of cloud computing: a complete guideline
Nayak et al. The InfoSec handbook: An introduction to information security
Tan et al. Post-Quantum Adversarial Modeling: A User’s Perspective
Chaudhry et al. Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm
Priyadarshini Introduction on cybersecurity
Malomo et al. Security through block vault in a blockchain enabled federated cloud framework
Chatterjee et al. A framework for development of secure software
Asbaş et al. Cyberattack and cyberwarfare strategies for businesses
Zafir et al. Enhancing security of internet of robotic things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques
Tanga et al. Cyber attack risks to construction data management in the fourth industrial revolution era: a case of Gauteng province, South Africa.
Betz An analysis of the relationship between security information technology enhancements and computer security breaches and incidents
Malhotra Cybersecurity & Cyber-Finance Risk Management: Strategies, Tactics, Operations, &, Intelligence: Enterprise Risk Management to Model Risk Management: Understanding Vulnerabilities, Threats, & Risk Mitigation (Presentation Slides)
Shekokar et al. Cyber Security Threats and Challenges Facing Human Life
Elhag Enhancing online banking transaction authentication by using tamper proof & cloud computing
Alotaibi et al. Sensitive data exposure: data forwarding and storage on cloud environment
Gordon et al. Cybersecurity & the Courthouse: safeguarding the judicial process
Ghosh The State‐of‐the‐Art in Zero‐Knowledge Authentication Proof for Cloud
Yadav et al. A comprehensive survey of IoT-based cloud computing cyber security
Aswathy et al. 10 Privacy Breaches
Pitropakis et al. Cloud security, privacy and trust baselines