[HTML][HTML] Development of cybersecurity technology and algorithm based on quantum computing

KK Ko, ES Jung - Applied Sciences, 2021 - mdpi.com
Many hacking incidents are linked to work files because most companies work with them.
However, a variety of file encryption and decryption methods have been proposed. Existing …

Development of cybersecurity technology and algorithm based on quantum computing

KK Ko, ES Jung - 2021 - scholarworks.bwise.kr
Many hacking incidents are linked to work files because most companies work with them.
However, a variety of file encryption and decryption methods have been proposed. Existing …

Development of Cybersecurity Technology and Algorithm Based on Quantum Computing

KK Ko, J Eun-Sung - Applied Sciences, 2021 - search.proquest.com
Many hacking incidents are linked to work files because most companies work with them.
However, a variety of file encryption and decryption methods have been proposed. Existing …

Development of Cybersecurity Technology and Algorithm Based on Quantum Computing

KK Ko, ES Jung - 2021 - agris.fao.org
Many hacking incidents are linked to work files because most companies work with them.
However, a variety of file encryption and decryption methods have been proposed. Existing …

Development of Cybersecurity Technology and Algorithm Based on Quantum Computing.

KK Ko, ES Jung - Applied Sciences (2076-3417), 2021 - search.ebscohost.com
Many hacking incidents are linked to work files because most companies work with them.
However, a variety of file encryption and decryption methods have been proposed. Existing …