Composable security of delegated quantum computation
Vedran DunjkoJoseph F. FitzsimonsChristopher PortmannRenato RennerPublished in: CoRR (2013)
Keyphrases
- quantum computation
- information security
- access control
- intrusion detection
- security level
- security threats
- computer security
- statistical databases
- security issues
- security requirements
- data encryption
- security systems
- distributed environment
- data sets
- key management
- security analysis
- security problems
- security management
- network management
- functional requirements
- security policies
- data security
- security model
- network security
- lightweight
- distributed systems
- data mining