2022
DOI: 10.32604/iasc.2022.020780
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Data of Software Security Life-Span: Quantum Computing Era

Abstract: Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of security relics for best potential outcomes. A security alternative gives several methods and algorithms to ensure the software security. Security estimation is the vital factor in assessing, administrating, controlling security to improve the nature of securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…e method is based on a priori knowledge, incorporating human experience in a traditional nonlinear system and fuzzifying the obtained rules to compile a set of rule base's and complete fuzzy inference, followed by fuzzy verdict and finally defuzzification of the signal or data after the verdict is completed using a defuzzifier. is is the basic process of the whole fuzzy control algorithm [27].…”
Section: Overview Of Fuzzy Control Eorymentioning
confidence: 99%
“…e method is based on a priori knowledge, incorporating human experience in a traditional nonlinear system and fuzzifying the obtained rules to compile a set of rule base's and complete fuzzy inference, followed by fuzzy verdict and finally defuzzification of the signal or data after the verdict is completed using a defuzzifier. is is the basic process of the whole fuzzy control algorithm [27].…”
Section: Overview Of Fuzzy Control Eorymentioning
confidence: 99%
“…Confidentiality [C1] The term confidentiality refers to enforcing agreed-upon restrictions on access and disclosure and protecting individual privacy and proprietary information [4].…”
Section: A Factorsmentioning
confidence: 99%
“…Quantum computer innovation is improving at an incredible rate of computing these days. A group of researchers has successfully developed the Sycamore Processor, a fully quantum processor that can plan a quantum circuit in 200 seconds, compared to 10,000 years for an old-style supercomputer [4]. The ongoing design of encryption or security strategies for various organizations, web applications, software, monetary construction of encryption, security in privacy, and everything else that relies on a computer network is in question, and the sturdiness of software is also influenced by a quantum computer.…”
Section: Introductionmentioning
confidence: 99%
“…Even though that date lies in the future, the benefits and dangers of quantum computers for companies are already relevant for all industries, especially in the realm of cryptography, because quantum computers will be able to crack encryption that is widely used today (BSI 2021;Mailloux et al 2016). Many present-day widely used cryptosystems could collapse (Alyami et al 2022). This makes a transition to new systems necessary that has a far greater scope and implications as classical security transitions (Joseph et al 2022).…”
Section: The Advent Of Quantum Computersmentioning
confidence: 99%