Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Myrto Arapinis"'
Publikováno v:
npj Quantum Information, Vol 8, Iss 1, Pp 1-10 (2022)
Abstract We introduce a secure hardware device named a QEnclave that can secure the remote execution of quantum operations while only using classical controls. This device extends to quantum computing from the classical concept of a secure enclave th
Externí odkaz:
https://doaj.org/article/6393c3be880f42518a0a6d0067fff1d6
Publikováno v:
Quantum, Vol 7, p 1014 (2023)
Physical unclonable functions(PUFs) provide a unique fingerprint to a physical entity by exploiting the inherent physical randomness. Gao et al. discussed the vulnerability of most current-day PUFs to sophisticated machine learning-based attacks. We
Externí odkaz:
https://doaj.org/article/0f6fec50893c46e9907a4a51653f0cba
Publikováno v:
Quantum, Vol 5, p 475 (2021)
A Physical Unclonable Function (PUF) is a device with unique behaviour that is hard to clone hence providing a secure fingerprint. A variety of PUF structures and PUF-based applications have been explored theoretically as well as being implemented in
Externí odkaz:
https://doaj.org/article/65a064ac930f47629541f81bb95349fc
Publikováno v:
Logical Methods in Computer Science, Vol Volume 10, Issue 2 (2014)
The design and verification of cryptographic protocols is a notoriously difficult task, even in symbolic models which take an abstract view of cryptography. This is mainly due to the fact that protocols may interact with an arbitrary attacker which y
Externí odkaz:
https://doaj.org/article/d9c711d3fdb549ad94cd29733fee54b9
Publikováno v:
Arapinis, M, Lamprou, N, Kashefi, E & Pappa, A 2021, ' Definitions and Security of Quantum Electronic Voting ', ACM Transactions on Quantum Computing, vol. 2, no. 1, 4 . https://doi.org/10.1145/3450144
Recent advances indicate that quantum computers will soon be reality. Motivated by this ever more realistic threat for existing classical cryptographic protocols, researchers have developed several schemes to resist “quantum attacks.” In particul
Publikováno v:
Ma, Y, Kashefi, E, Arapinis, M, Chakraborty, K & Kaplan, M 2022, ' QEnclave-A practical solution for secure quantum cloud computing ', npj Quantum Information, vol. 8, 128 . https://doi.org/10.1038/s41534-022-00612-5
We introduce a secure hardware device named a QEnclave that can secure the remote execution of quantum operations while only using classical controls. This device extends to quantum computing the classical concept of a secure enclave which isolates a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3b7aa99ca2c980e168563ea9fa0c6a0b
https://hal.sorbonne-universite.fr/hal-03418181
https://hal.sorbonne-universite.fr/hal-03418181
Publikováno v:
Chakraborty, K, Doosti, M, Ma, Y, Wadhwa, C, Arapinis, M & Kashefi, E 2023, ' Quantum Lock: A Provable Quantum Communication Advantage ', Quantum, vol. 7, 1014 . https://doi.org/10.22331/q-2023-05-23-1014
Physical unclonable functions(PUFs) provide a unique fingerprint to a physical entity by exploiting the inherent physical randomness. Gao et al. discussed the vulnerability of most current-day PUFs to sophisticated machine learning-based attacks. We
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cea726be4c5dc56b38f0df74d526f7a8
http://arxiv.org/abs/2110.09469
http://arxiv.org/abs/2110.09469
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920746
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::59698b374731e4433f6603274a71f9c7
https://doi.org/10.1007/978-3-030-92075-3_14
https://doi.org/10.1007/978-3-030-92075-3_14
Publikováno v:
Doosti, M, Kashefi, E, Arapinis, M & Delavar, M 2021, ' Quantum Physical Unclonable Functions: Possibilities and Impossibilities ', Quantum, vol. 5, 475 . https://doi.org/10.22331/q-2021-06-15-475
Quantum, Vol 5, p 475 (2021)
Quantum, Vol 5, p 475 (2021)
A Physical Unclonable Function (PUF) is a device with unique behaviour that is hard to clone hence providing a secure fingerprint. A variety of PUF structures and PUF-based applications have been explored theoretically as well as being implemented in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::075909f8ccd2f65ab571da0b5c417a61
Publikováno v:
CNS
Singh, R, Theodorakopoulos, G, Marina, M K & Arapinis, M 2018, On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing . in 2018 IEEE Conference on Communications and Network Security (CNS) . Institute of Electrical and Electronics Engineers (IEEE), Beijing, China, 6th Annual IEEE Conference on Communications and Network Security, Beijing, China, 30/05/18 . https://doi.org/10.1109/CNS.2018.8433178
Singh, R, Theodorakopoulos, G, Marina, M K & Arapinis, M 2018, On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing . in 2018 IEEE Conference on Communications and Network Security (CNS) . Institute of Electrical and Electronics Engineers (IEEE), Beijing, China, 6th Annual IEEE Conference on Communications and Network Security, Beijing, China, 30/05/18 . https://doi.org/10.1109/CNS.2018.8433178
Various notions of privacy preservation have been proposed for mobile trajectory data sharing/publication. The privacy guarantees provided by these approaches are theoretically very different and cannot be directly compared against each other. They a