Tan et al., 2023 - Google Patents
Post-Quantum Adversarial Modeling: A User's PerspectiveTan et al., 2023
View PDF- Document ID
- 17140394959696428379
- Author
- Tan T
- Zhou J
- Sharma V
- Mohanty S
- Publication year
- Publication venue
- Computer
External Links
Snippet
What are adversaries doing to prepare for the impending arrival of quantum computers? We take an adversarial modeling approach to identify various personas and flesh out passive and active actions such adversaries can take to gain an advantage, before providing …
- 230000009471 action 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alghofaili et al. | Secure cloud infrastructure: A survey on issues, current solutions, and open challenges | |
Swire et al. | Encryption and globalization | |
Kafi et al. | Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection | |
Rao et al. | The InfoSec handbook: An introduction to information security | |
US20230412626A1 (en) | Systems and methods for cyber security and quantum encapsulation for smart cities and the internet of things | |
Dawood et al. | Cyberattacks and security of cloud computing: a complete guideline | |
Nayak et al. | The InfoSec handbook: An introduction to information security | |
Tan et al. | Post-Quantum Adversarial Modeling: A User’s Perspective | |
Chaudhry et al. | Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm | |
Priyadarshini | Introduction on cybersecurity | |
Malomo et al. | Security through block vault in a blockchain enabled federated cloud framework | |
Chatterjee et al. | A framework for development of secure software | |
Asbaş et al. | Cyberattack and cyberwarfare strategies for businesses | |
Zafir et al. | Enhancing security of internet of robotic things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques | |
Tanga et al. | Cyber attack risks to construction data management in the fourth industrial revolution era: a case of Gauteng province, South Africa. | |
Betz | An analysis of the relationship between security information technology enhancements and computer security breaches and incidents | |
Malhotra | Cybersecurity & Cyber-Finance Risk Management: Strategies, Tactics, Operations, &, Intelligence: Enterprise Risk Management to Model Risk Management: Understanding Vulnerabilities, Threats, & Risk Mitigation (Presentation Slides) | |
Shekokar et al. | Cyber Security Threats and Challenges Facing Human Life | |
Elhag | Enhancing online banking transaction authentication by using tamper proof & cloud computing | |
Alotaibi et al. | Sensitive data exposure: data forwarding and storage on cloud environment | |
Gordon et al. | Cybersecurity & the Courthouse: safeguarding the judicial process | |
Ghosh | The State‐of‐the‐Art in Zero‐Knowledge Authentication Proof for Cloud | |
Yadav et al. | A comprehensive survey of IoT-based cloud computing cyber security | |
Aswathy et al. | 10 Privacy Breaches | |
Pitropakis et al. | Cloud security, privacy and trust baselines |