Search
Commonly used classical cryptographic protocols, such as the RSA-protocol, rely on the hardness of computational problems. With the advent of quantum computing (QC), the hardness assumptions of these problems is nullified, since they can be solved efficiently on a QC. On the other hand, the security of Quantum key distribution (QKD) rests upon the very laws of physics and guarantees information-theoretic security, which not only enables tap-proof communication at present, but also prevents any future technology to crack encrypted messages.
AUSTRIAN ACADEMY OF...
Tables and graphs are knowingly used to organise data within a company with different levels of depth and complexity. Knowledge graphs (KGs) are particularly useful because they can cope with data diversity (high-quality complete data and sparse and incomplete data), they have a high degree of scalability and flexibility (the semantic data model can be inter-operational, large, wide and as deep as needed) and, last but not least, they provide reasoning and inference capabilities.
UNIVERSITY OF STRATHCLYDE
Filter by programme:
Filter by start year:
Filter by end year:
Filter by keywords:
- CDF (1) Apply CDF filter
- cryptographic protocols (1) Apply cryptographic protocols filter
- knowledge graphes (1) Apply knowledge graphes filter
- MBSE (1) Apply MBSE filter
- quantum computing (1) Apply quantum computing filter
- Quantum Optics (1) Apply Quantum Optics filter
- system engineering models (1) Apply system engineering models filter
Filter by contractor:
Filter by country:
Filter by application domain:
Filter by competence domain:
Filter by technology domain:
- (-) Remove 2 - Space System Software filter 2 - Space System Software
- 6 - RF Subsystems, Payloads and Technologies (1) Apply 6 - RF Subsystems, Payloads and Technologies filter
- 7 - Electromagnetic Technologies and Techniques (1) Apply 7 - Electromagnetic Technologies and Techniques filter
- 8 - System Design & Verification (1) Apply 8 - System Design & Verification filter