Qubits put new spin on magnetism: Boosting applications of quantum computers
Research using a quantum computer as the physical platform for quantum experiments has found a way to design and characterize tailor-made magnetic objects using quantum bits, or qubits. That opens up a new approach to develop new materials and robust quantum computing. more…
New breakthrough enables perfectly secure digital communications
Researchers have achieved a breakthrough to enable ‘perfectly secure’ hidden communications for the first time. The method uses new advances in information theory methods to conceal one piece of content inside another in a way that cannot be detected. This may have strong implications for information security, besides further applications in data compression and storage. more…
Are our pets leaking information about us?
Pet and animal-related apps are creating cybersecurity risks to their owners, new research has shown. more…
Securing supply chains with quantum computing
New research in quantum computing is moving science closer to being able to overcome supply-chain challenges and restore global security during future periods of unrest. more…
Chromo-encryption method encodes secrets with color
In a new approach to security that unites technology and art, E researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages. more…
Quantum physicists make major nanoscopic advance
In a new breakthrough, researchers have solved a problem that has caused quantum researchers headaches for years. The researchers can now control two quantum light sources rather than one. Trivial as it may seem to those uninitiated in quantum, this colossal breakthrough allows researchers to create a phenomenon known as quantum mechanical entanglement. This in […] more…
Researchers propose methods for automatic detection of doxing
A new automated approach to detect doxing — a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual’s consent or knowledge — may help social media platforms better protect their users, according to researchers. more…
Quantum algorithms save time in the calculation of electron dynamics
Quantum computers promise significantly shorter computing times for complex problems. But there are still only a few quantum computers worldwide with a limited number of so-called qubits. However, quantum computer algorithms can already run on conventional servers that simulate a quantum computer. A team has succeeded in calculating the electron orbitals and their dynamic development […] more…
Microlaser chip adds new dimensions to quantum communication
With only two levels of superposition, the qubits used in today’s quantum communication technologies have limited storage space and low tolerance for interference. Engineering’s hyperdimensional microlaser generates ‘qudits,’ photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications. more…
New AI model can help prevent damaging and costly data breaches
Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks. more…
New form of universal quantum computers
Computing power of quantum machines is currently still very low. Increasing it is still proving to be a major challenge. Physicists now present a new architecture for a universal quantum computer that overcomes such limitations and could be the basis of the next generation of quantum computers soon. more…
New method to systematically find optimal quantum operation sequences for quantum computers developed
Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool […] more…
Why ‘erasure’ could be key to practical quantum computing
A new method for correcting errors in the calculations of quantum computers potentially clears a major obstacle to a powerful new realm of computing. more…
From bits to p-bits: One step closer to probabilistic computing
Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data. more…
Thinking like a cyber-attacker to protect user data
Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key. more…
A key role for quantum entanglement
A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement — offering much broader security guarantees than previous schemes. more…
2017 Antivirus News | Powered by WordPress |
Fluxipress Theme
| Show My IP Address, check blacklists
| Free Favicon, Android and Apple Icon Generator
| Bitcoin and Crypto Currency News
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More Privacy & Cookies Policy