Author of the publication

Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals.

, , , and . IT Prof., 18 (5): 42-47 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System., , , and . SysCon, page 1-7. IEEE, (2019)Examination of security design principles from NIST SP 800-160., , and . SysCon, page 1-8. IEEE, (2018)Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study., and . CNS, page 1-8. IEEE, (2020)Performance Evaluations of Quantum Key Distribution System Architectures., , , , and . IEEE Secur. Priv., 13 (1): 30-40 (2015)Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals., , , and . IT Prof., 18 (5): 42-47 (2016)Considerations for Cyber-Physical Design Teams Tasked with Engineering Safe and Secure Systems for a Notional Electrified Aircraft Concept., , and . SysCon, page 1-8. IEEE, (2023)Quantum key distribution: examination of the decoy state protocol., , , , , , and . IEEE Communications Magazine, 53 (10): 24-31 (2015)Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver., , , and . Digital Investigation, (2016)Advancing Cybersecurity: The Growing Need for a Cyber-Resiliency Workforce., and . IT Prof., 20 (3): 23-30 (2018)Concrete Safety for ML Problems: System Safety for ML Development and Assessment., , , , and . CoRR, (2023)