Page 307 - Kaleidoscope Academic Conference Proceedings 2024
P. 307
Innovation and Digital Transformation for a Sustainable World
QKD, is used to protect the veracity and security of the voting [9] A. Kumar and S. Garhwal, “State-of-the-art survey of
systems, including the elections. quantum cryptography,” Arch. Comput. Methods Eng.,
vol. 28, no. 5, pp. 3831–3868, Aug. 2021.
7. CONCLUSION AND FUTURE DIRECTION
[10] M. Z. Chowdhury, M. Shahjalal, S. Ahmed, and
Although traditional communication systems have some Y. M. Jang, “6G wireless communication systems:
drawback, such as not being able to meet the growing criteria Applications, requirements, technologies, challenges,
and security problems, they still play a significant role in and research directions,” IEEE Open J. Commun. Soc.,
communication. The quantitative communication provides vol. 1, pp. 957–975, 2020.
an integrating mechanism that applies a quantum concept to
[11] A. Acin, I. Bloch, H. Buhrman, T. Calarco, C. Eichler, et
address those challenges. Thus, the process may be replicated
al., “The quantum technologies roadmap: A European
in other business fields. First stage is finding the ways of
community view,” New Journal of Physics, vol. 20, no.
getting over the barriers to the full development of these
8, p. 80201, 2018.
features. Quantum transmisson, on the other hand, offers
primitive level of security for information technology, rather [12] M. Coccia and S. Roshani, “Path-Breaking Directions
leads to a higher efficiency, connectivity, and practicality in Quantum Computing Technology: A Patent Analysis
which will ultimately give way to the conventional techniques with Multiple Techniques,” Journal of the Knowledge
of information technology. Not only innovation for this but Economy, 2024.
research as well is the dire need to unlock the potential of the
[13] J. Seol and J. Kim, “Machine Learning Ensures
whole remodeling process.
Quantum-Safe Blockchain Availability,” Journal of
Computer Information Systems, 2024.
REFERENCES
[14] S. Deshmukh and P. Mulay, “Quantum clustering
[1] V. Vedral, “Introduction to Quantum Information drives innovations: A bibliometric and patentometric
Science,” Oxford Graduate Texts, Oxford, 2006; analysis,” Library Philosophy and Practice, 2021.
[2] M. A. Nielsen and I. L. Chuang, Quantum Computation [15] M. Coccia, “Converging Artificial Intelligence and
and Quantum Information. Cambridge University Press, Quantum Technologies: Accelerated Growth Effects in
2010. Technological Evolution,” Technologies, vol. 12, no. 5,
p. 66, 2024.
[3] S. Rakib Hasan, M. Z. Chowdhury, Md. Saiam, and Y.
M. Jang, “Quantum Communication Systems: Vision, [16] S. Y. Jiang and S. L. Chen, “Exploring landscapes
Protocols, Applications, and Challenges,” IEEE Access, of quantum technology with patent network analysis,”
vol. 11, pp. 15855-15877, 2023, doi: 10.1109/ Technology Analysis & Strategic Management, vol. 33,
ACCESS.2023.3244395. no. 11, pp. 1317–1331, 2021.
[4] A. Einstein, B. Podolsky, and N. Rosen, “Can [17] D. Aggarwal, N. G. Boddu, R. Jain, and M.
Quantum-Mechanical Description of Physical Reality Obremski, “Quantum Measurement Adversary,” IEEE
Be Considered Complete?”, Phys. Rev., vol. 47, no. 10, Transactions on Information Theory, vol. 70, no. 1, pp.
pp. 777–780, 1935, doi: 10.1103/PhysRev.47.777. 318–335, 2024.
[5] M. Hirvensalo, Quantum Computing, Natural [18] T. Murariu, A. Pastrav, C. Tripon, E. Puschita, and
Computing Series, Springer Berlin, Heidelberg, 2nd L. P. Zarbo, “A roadmap for building quantum key
edition, 2004, doi: https://doi.org/10.1007/ distribution devices,” Proceedings - RoEduNet IEEE
978-3-662-09636-9. International Conference, 2022-September.
[6] Cryptography, Computer Network Security, Springer [19] M. Coccia, M. Mosleh, and S. Roshani, “Evolution
US, Boston, MA, 2005, pp. 257–284, isbn: of Quantum Computing: Theoretical and Innovation
978-0-387-25228-5, doi: 10.1007/0-387-25228-2_ Management Implications for Emerging Quantum
10, Industry,” IEEE Transactions on Engineering
Management, vol. 71, pp. 2270-2280, 2024.
[7] S. Ricci, P. Dobias, L. Malina, J. Hajny, and
P. Jedlicka, “Hybrid Keys in Practice: Combining [20] Y. Baseri, V. Chouhan, and A. Hafid, “Navigating
Classical, Quantum and Post-Quantum Cryptography,” quantum security risks in networked environments:
IEEE Access, vol. 12, pp. 23206-23219, 2024, doi: A comprehensive study of quantum-safe network
10.1109/ACCESS.2024.3364520. protocols,” Computers and Security, vol. 142, p.
103883, 2024.
[8] C. H. Bennett and G. Brassard, “Quantum cryptography:
Public key distribution and coin tossing,” In [21] M. Coccia, “Technological trajectories in quantum
Proceedings of IEEE International Conference on computing to design a quantum ecosystem for industrial
Computers, Systems and Signal Processing, vol. 175, change,” Technology Analysis & Strategic Management,
page 8, New York, 1984. vol. 36, no. 8, pp. 1733–1748, 2022.
– 263 –