Attacking the Quantum Internet

نویسندگان

چکیده

The main service provided by the coming Quantum Internet will be creating entanglement between any two quantum nodes. We discuss and classify attacks on repeaters, which serve roles similar to those of classical routers. have modeled components for structure repeater network With this model, we point out attack vectors, then analyze in terms confidentiality, integrity availability. While are reassured about promises networks from confidentiality view, availability present new vulnerabilities not require care handle properly. observe that requirements computing/networking elements affect systems' overall security risks. This component-based analysis establishes a framework further investigation network-wide vulnerabilities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacking the Washington, D.C. Internet Voting System

In 2010, Washington, D.C. developed an Internet voting pilot project that was intended to allow overseas absentee voters to cast their ballots using a website. Prior to deploying the system in the general election, the District held a unique public trial: a mock election during which anyone was invited to test the system or attempt to compromise its security. This paper describes our experience...

متن کامل

factor influencing the adoption of internet banking

دوره مشترک کارشناسی ارشد بازاریابی و تجارت الکترونیک دانشگاه تربیت مدرس_ دانشگاه تکنولوژی lule? چکیده پایان نامه عوامل موثر بر پذیرش اینترنت بانک توسط مشتریان پیشرفت فناوری اطلاعات و ارتباطات و به طور خاص رشد اینترنت جهت تراکنش های معاملات بازرگانی، تاثیر بسیار عمیقی در صنعت بانکداری داشته است.این در حالی ست که نفوذ بانکداری اینترنتی در کشورهای در حال توسعه بسیار کندتر از نفوذ آن ...

15 صفحه اول

From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television

In the attempt to bring modern broadband Internet features to traditional broadcast television, the Digital Video Broadcasting (DVB) consortium introduced a specification called Hybrid Broadcast-Broadband Television (HbbTV), which allows broadcast streams to include embedded HTML content which is rendered by the television. This system is already in very wide deployment in Europe, and has recen...

متن کامل

Closer to Quantum Internet

Quantum computers are one of the most promising technologies under development, and all their promises are completely justified. Quantum systems are extremely expensive to compute, where “expensiveness” can be measured either by the memory or the computational time required in classical computers. But it should be much cheaper if the computer uses quantum mechanics rules. The comparison is simp...

متن کامل

Attacking the OutGuess

In this paper, we describe new methodology for developing steganalytic methods for JPEG images. The proposed framework can be applied to virtually all current methods for JPEGs including OutGuess, F5, and J-Steg. It also enables accurate estimation of the length of the embedded secret message. The methodology is demonstrated on OutGuess 0.2.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE transactions on quantum engineering

سال: 2021

ISSN: ['2689-1808']

DOI: https://doi.org/10.1109/tqe.2021.3094983