Synthetic networks may increase the availability of some data while still protecting individual or institutional privacy, according to a Penn State statistician.
Debbie Leung, a fellow in CIFAR's Quantum Information Science program and a faculty member at the University of Waterloo's Institute for Quantum Computing, will discuss the challenges of scaling quantum computing at the AAAS meeting on Feb. 16.
Lav Varshney, an assistant professor of electrical and computer engineering at the University of Illinois at Urbana-Champaign, will lead a session on 'Blockchain and the Scientific Method' as a part of the American Association for the Advancement of Science (AAAS) annual meeting in Washington D.C., on Feb. 15, 2019.
'The quarantine is a decoy that behaves very similar to the real compromised target to keep the attacker assuming that the attack is still succeeding. In a typical cyberattack the more deeply attackers go in the system, the more they have the ability to go many directions. It becomes like a Whack-A-Mole game for those defending the system. Our strategy simply changes the game, but makes the attackers think they are being successful.'
Summary The most basic type of quantum information processing is quantum entanglement. In a new study published in EPJ B, Zhaonan Zhang from Shaanxi Normal University, Xi'an, China, and colleagues have provided a much finer characterisation of the distributions of entanglement in multi-qubit systems than previously available. These findings can be used in quantum cryptography to estimate the quantity of information an eavesdropper can capture regarding the secret encryption key.
Despite being the most advanced quantum technology, secure encryption of information units based on a method called quantum key distribution (QKD) is currently limited by the channel's capacity to send or share secret bits. In a recent study published in EPJ D, Gan Wang, who is affiliated with both Peking University, Bejing, China, and the University of York, UK, and colleagues show how to better approach the secret key capacity by improving the channel's lower boundary.
Research analysis finds that a moderate level of piracy can have a positive impact on the bottom line for both the manufacturer and the retailer -- and not at the expense of consumers.
University of Toronto Engineering researchers have demonstrated proof-of-principle for a device that could serve as the backbone of a future quantum Internet. U of T professor Hoi-Kwong Lo and his collaborators have developed a prototype for a key element for all-photonic quantum repeaters, a critical step in long-distance quantum communication.
According to new research, the terrorist attacks we don't see on the news -- cyberattacks by far-left extremists -- are causing more widespread destruction than we know.
Minority and dissident communities face a perplexing challenge in countries with authoritarian governments. They need to remain anonymous to avoid persecution, but also must establish a trustworthy identity in their communications. An interdisciplinary group of researchers at UC Santa Barbara has designed an application to meet both of these requirements.