Secure quantum computing for healthcare sector: A short analysis

نویسندگان

چکیده

Quantum computing research might lead to “quantum leaps,” and it could have unanticipated repercussions in the medical field. This technique has potential be used a broad range of contexts, some which include development novel drugs, individualization treatments, speeding deoxyribonucleic acid sequencing. work assembled list numerous methodologies presently employed quantum medicine other disciplines pertaining healthcare. created most critical concerns that need addressed before use can realized. In addition, this investigates detail ways future applications compromise safety healthcare delivery systems from perspective industry patient-centric system. The primary objective investigation into cryptography is locate any flaws cryptographic protocols strategies only very recently been focus scrutiny academic community members.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum-enhanced secure delegated classical computing

We present a family of quantumly-enhanced protocols to achieve unconditionally secure delegated classical computation where the client and the server have both their classical and quantum computing capacity limited. We prove the same task cannot be achieved using only classical protocols. This extends the work of Anders and Browne on the computational power of correlations to a security setting...

متن کامل

Enterprise Computing in Healthcare Sector: Emerging Trends and Future Challenges

Enterprise distributed computing has made rapid strides in many sectors of the economy, such as telecommunications and finance sectors. Organizations are now reaping benefits of these advances through better efficiency and better quality of services worldwide. There have been attempts by many groups to implement such benefits in the healthcare sector, the largest business sector in the world. H...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

RFID Privacy Concerns: A Conceptual Analysis in the Healthcare Sector

Radio Frequency Identification (RFID) is a wireless technology that utilizes radio waves to automatically capture data for identifying and tracking objects and/or people. As the use of RFID has grown, so has the chorus of privacy invasions against this identity-aware technology. With the planned deployment and use of RFID in healthcare, there are concerns regarding the social, technological and...

متن کامل

A Secure and Confidentiality Strategic Computing Organization for Mobile-healthcare Emergency

With the advancement of mobile phones especially smart phones and the Wi-Fi connected systems, mobile Healthcare (m-Healthcare) makes the better utilization of health monitoring programs, which are attracted often. We propose a secure and confidentiality strategic computing organization (SCSCO) for m-HealthCare emergency. With this approach, smart phone plays computing power of energy and the w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and privacy

سال: 2022

ISSN: ['2475-6725']

DOI: https://doi.org/10.1002/spy2.293