Quantum Technologies : Trends and Implications for Cyber Defense / Julian Jang-Jaccard.
نوع المادة :
ملف الحاسوباللغة: الإنجليزية السلاسل:Computer Science Seriesالناشر:Cham : Springer, 2025تاريخ حقوق النشر: 2026الطبعات:1st edوصف:1 online resource (329 pages)نوع المحتوى:- text
- computer
- online resource
- 9783031907272
| نوع المادة | المكتبة الحالية | رقم الطلب | رابط URL | حالة | تاريخ الإستحقاق | الباركود | حجوزات مادة | |
|---|---|---|---|---|---|---|---|---|
مصدر رقمي
|
UAE Federation Library | مكتبة اتحاد الإمارات Online Copy | نسخة إلكترونية | رابط إلى المورد | لا يعار |
Quantum Technologies -- Foreword I -- Foreword II -- Glossary -- Preface -- Acknowledgments -- Contents -- Part I: Quantum Computing -- 1. Superconducting Qubits -- 2. Trapped-Ion Quantum Computers -- 2.1 Introduction -- 2.2 Analysis -- 2.3 Conclusion -- 3. Quantum Computing with Neutral Atoms -- 3.1 Introduction -- 3.2 Analysis -- 3.3 Maturity -- 3.4 Trends -- 3.5 Recommendations -- 3.6 Conclusion -- 4. Quantum Computing with Semiconductor Spin -- 4.1 Introduction -- 4.2 Analysis -- 4.2.1 Types of Semiconductor Spin Qubits -- 4.2.2 Physical Qubit Yield, Reliability, and Connectivity -- 4.2.3 Coherence Times -- 4.2.4 Fidelity -- 4.2.5 Operational Speed -- 4.2.6 Scaling up to Larger Systems -- 4.2.7 Maturity -- 4.3 Trends in Semiconductor Spin Qubit Research -- 4.4 Recommendations -- 4.5 Conclusion -- 5. Quantum Error Control and Mitigation Strategies -- 5.1 Introduction -- 5.2 Analysis -- 5.2.1 Maturity -- 5.2.2 Trends -- 5.3 Recommendations -- 5.4 Conclusion -- 6. Quantum Optimization -- 6.1 Introduction -- 6.2 Analysis -- 6.2.1 Maturity -- 6.2.2 Trends -- 6.3 Recommendations -- 6.4 Conclusion -- 7. Quantum Annealing -- 7.1 Introduction -- 7.2 Analysis -- 7.3 Outlook for the Defense Industry -- 7.4 Conclusion -- 8. Quantum Machine Learning -- 8.1 Introduction -- 8.2 Analysis -- 8.2.1 Definition -- 8.2.2 Maturity -- 8.2.3 Trends -- 8.3 Recommendation for Advancement of QML and QAML -- 8.4 Conclusion -- 9. Enabling and Accelerating Quantum Computing with AI Supercomputing -- Summary Part I -- Part II: Quantum Communication -- 10. Quantum Threats -- 10.1 Introduction -- 10.2 Common Types of Encryption -- 10.3 The Timeline to Powerful Quantum Computers -- 10.4 Quantum Algorithms to Break Encryption -- 10.5 Recommendations for Further Actions -- 10.5.1 Directions for Governments -- 10.5.2 Directions for Private and Public Technology Providers -- 10.5.3 Directions for Organizational End Users -- 10.5.4 Directions for Private Individuals -- 10.6 Conclusion -- 11. Quantum Random Number Generators (QRNG) -- 11.1 The Importance of Randomness in Data Security -- 11.2 Analysis -- 11.3 Implementations and Use Cases -- 11.4 Final Recommendations for End-Users -- 11.5 Conclusion -- 12. Trends in Quantum Key Distribution (QKD) -- 12.1 Introduction -- 12.2 Maturity of QKD Technology -- 12.2.1 QKD Systems -- 12.2.2 QKD Activities and Testbeds -- 12.3 Trends and Innovations of QKD -- 12.3.1 Vision and Future Outlook -- 12.4 Recommendations -- 12.5 Conclusion -- 13. Migrating to Quantum Key Distribution -- 13.1 Introduction: The Largest Crypto Migration Ever -- 13.2 Analysis -- 13.2.1 QKD Links -- 13.2.2 Design of a QKD Network -- 13.2.3 Building a QKD Infrastructure -- 13.2.4 QKD for Defense -- 13.3 Conclusion: Recommendations -- 14. Post-Quantum Cryptography -- 14.1 Introduction -- 14.2 Trends -- 14.3 Analysis -- 14.4 Recommendations -- 14.5 Conclusion -- 15. Quantum Readiness: Recommendations for Enterprises -- 15.1 Introduction -- 15.2 Threats and Timelines -- 15.3 Recommendations -- 15.3.1 Build a Cryptographic Inventory -- 15.3.2 Engage with Technology Vendors -- 15.3.3 Update Custom Systems -- 15.3.4 Cryptographic Agility -- 15.3.5 Zero Trust Architecture -- 15.4 Conclusion -- 16. Perspective on the QKD Versus PQC Debate -- 16.1 Challenges and Opportunities for Quantum Key Distribution -- 16.2 Conclusion and Recommendations -- 17. Quantum Technologies for Space Applications -- Summary Part II -- Part III: Quantum Technology Ecosystem Analysis -- 18. Global Quantum Strategies -- 19. Investment Trends in Quantum Computing -- 19.1 Introduction -- 19.2 Outline of Investments -- 19.3 Discretionary Evidence -- 19.4 Future Work with Financial Methods -- 19.5 Recommendations -- 19.6 Conclusion -- 20. Analysis of Quantum Trends in Open Software Repositories and Financial News -- 20.1 Introduction -- 20.2 Analysis -- 20.3 Insights from GitHub -- 20.4 Insights from Financial Newspaper -- 20.5 Recommendations -- 20.6 Conclusion -- 21. Bibliometric Analysis of Convergence of Quantum Technologies -- 21.1 Introduction -- 21.2 Methodology -- 21.3 Analysis -- 21.4 Conclusion -- 22. Quantum Ecosystem of Switzerland -- 22.1 Introduction -- 22.2 Analysis -- 22.2.1 Maturity -- 22.2.2 Swiss Trends in International Perspective -- 22.3 Conclusion -- Summary Part III.
This open access book invites readers to explore the emerging opportunities and strategic significance of quantum technologies in the context of cybersecurity.It collects the latest trends and insights into the evolution of quantum computing and quantum communication, offering valuable guidance.
Description based on publisher supplied metadata and other sources.
