Feedback

X
Quantum Technologies
0 Ungluers have Faved this Work
This open access book invites readers to explore the emerging opportunities and strategic significance of quantum technologies in the context of cybersecurity. It collects the latest trends and insights into the evolution of quantum computing and quantum communication, offering valuable guidance. To this end, it brings together comprehensive trends, research, and insights from more than 40 leading experts from around the globe to provide a deep understanding of the opportunities, challenges, and implications of quantum technologies for cyber defence. Divided in three parts, the book examines core advancements in various types of quantum technologies and also addresses the key obstacles that limit progress. It explores the potential disruptions to current cryptographic standards alongside potential solutions, as well as global quantum strategies and tools designed to monitor trends in quantum technologies. This is the third book in a series published by the Technology Monitoring (TM) team of the Cyber-Defence Campus. It serves as a resource for researchers, cybersecurity specialists, policymakers, and industry leaders navigating the rapidly evolving quantum landscape. It aims to foster informed decision-making and encourage collaboration across sectors.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 0 times via unglue.it ebook links.
  1. 0 - pdf (CC BY) at OAPEN Library.

Keywords

  • Cyber Defence
  • cybersecurity
  • encryption
  • open access
  • post-quantum cryptography
  • Quantum Applications
  • quantum communication
  • quantum computing
  • quantum machine learning
  • Supercomputing
  • thema EDItEUR::P Mathematics and Science::PH Physics::PHQ Quantum physics (quantum mechanics and quantum field theory)
  • thema EDItEUR::U Computing and Information Technology::UR Computer security
  • thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security
  • thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation

Links

DOI: 10.1007/978-3-031-90727-2

Editions

edition cover

Share

Copy/paste this into your site: