Page 307 - Kaleidoscope Academic Conference Proceedings 2024
P. 307

Innovation and Digital Transformation for a Sustainable World




           QKD, is used to protect the veracity and security of the voting  [9] A. Kumar and S. Garhwal, “State-of-the-art survey of
           systems, including the elections.                      quantum cryptography,” Arch. Comput. Methods Eng.,
                                                                  vol. 28, no. 5, pp. 3831–3868, Aug. 2021.
              7.  CONCLUSION AND FUTURE DIRECTION
                                                              [10] M. Z. Chowdhury, M. Shahjalal, S. Ahmed, and
           Although traditional communication systems have some   Y. M. Jang, “6G wireless communication systems:
           drawback, such as not being able to meet the growing criteria  Applications, requirements, technologies, challenges,
           and security problems, they still play a significant role in  and research directions,” IEEE Open J. Commun. Soc.,
           communication. The quantitative communication provides  vol. 1, pp. 957–975, 2020.
           an integrating mechanism that applies a quantum concept to
                                                              [11] A. Acin, I. Bloch, H. Buhrman, T. Calarco, C. Eichler, et
           address those challenges. Thus, the process may be replicated
                                                                  al., “The quantum technologies roadmap: A European
           in other business fields. First stage is finding the ways of
                                                                  community view,” New Journal of Physics, vol. 20, no.
           getting over the barriers to the full development of these
                                                                  8, p. 80201, 2018.
           features. Quantum transmisson, on the other hand, offers
           primitive level of security for information technology, rather  [12] M. Coccia and S. Roshani, “Path-Breaking Directions
           leads to a higher efficiency, connectivity, and practicality  in Quantum Computing Technology: A Patent Analysis
           which will ultimately give way to the conventional techniques  with Multiple Techniques,” Journal of the Knowledge
           of information technology. Not only innovation for this but  Economy, 2024.
           research as well is the dire need to unlock the potential of the
                                                              [13] J. Seol and J. Kim, “Machine Learning Ensures
           whole remodeling process.
                                                                  Quantum-Safe Blockchain Availability,” Journal of
                                                                  Computer Information Systems, 2024.
                            REFERENCES
                                                              [14] S. Deshmukh and P. Mulay, “Quantum clustering
            [1] V. Vedral, “Introduction to Quantum Information   drives innovations: A bibliometric and patentometric
               Science,” Oxford Graduate Texts, Oxford, 2006;     analysis,” Library Philosophy and Practice, 2021.

            [2] M. A. Nielsen and I. L. Chuang, Quantum Computation  [15] M. Coccia, “Converging Artificial Intelligence and
               and Quantum Information. Cambridge University Press,  Quantum Technologies: Accelerated Growth Effects in
               2010.                                              Technological Evolution,” Technologies, vol. 12, no. 5,
                                                                  p. 66, 2024.
            [3] S. Rakib Hasan, M. Z. Chowdhury, Md. Saiam, and Y.
               M. Jang, “Quantum Communication Systems: Vision,  [16] S. Y. Jiang and S. L. Chen, “Exploring landscapes
               Protocols, Applications, and Challenges,” IEEE Access,  of quantum technology with patent network analysis,”
               vol. 11, pp. 15855-15877, 2023, doi:  10.1109/     Technology Analysis & Strategic Management, vol. 33,
               ACCESS.2023.3244395.                               no. 11, pp. 1317–1331, 2021.
            [4] A. Einstein, B. Podolsky, and N. Rosen, “Can  [17] D. Aggarwal, N. G. Boddu, R. Jain, and M.
               Quantum-Mechanical Description of Physical Reality  Obremski, “Quantum Measurement Adversary,” IEEE
               Be Considered Complete?”, Phys. Rev., vol. 47, no. 10,  Transactions on Information Theory, vol. 70, no. 1, pp.
               pp. 777–780, 1935, doi: 10.1103/PhysRev.47.777.    318–335, 2024.
            [5] M.  Hirvensalo,  Quantum  Computing,  Natural  [18] T. Murariu, A. Pastrav, C. Tripon, E. Puschita, and
               Computing Series, Springer Berlin, Heidelberg, 2nd  L. P. Zarbo, “A roadmap for building quantum key
               edition, 2004, doi:  https://doi.org/10.1007/      distribution devices,” Proceedings - RoEduNet IEEE
               978-3-662-09636-9.                                 International Conference, 2022-September.
            [6] Cryptography, Computer Network Security, Springer  [19] M. Coccia, M. Mosleh, and S. Roshani, “Evolution
               US, Boston,   MA, 2005,   pp. 257–284,  isbn:      of Quantum Computing: Theoretical and Innovation
               978-0-387-25228-5, doi: 10.1007/0-387-25228-2_     Management Implications for Emerging Quantum
               10,                                                Industry,”  IEEE  Transactions  on  Engineering
                                                                  Management, vol. 71, pp. 2270-2280, 2024.
            [7] S. Ricci, P. Dobias, L. Malina, J. Hajny, and
               P. Jedlicka, “Hybrid Keys in Practice: Combining  [20] Y. Baseri, V. Chouhan, and A. Hafid, “Navigating
               Classical, Quantum and Post-Quantum Cryptography,”  quantum security risks in networked environments:
               IEEE Access, vol. 12, pp. 23206-23219, 2024, doi:  A comprehensive study of quantum-safe network
               10.1109/ACCESS.2024.3364520.                       protocols,” Computers and Security, vol. 142, p.
                                                                  103883, 2024.
            [8] C. H. Bennett and G. Brassard, “Quantum cryptography:
               Public key distribution and coin tossing,”  In  [21] M. Coccia, “Technological trajectories in quantum
               Proceedings of IEEE International Conference on    computing to design a quantum ecosystem for industrial
               Computers, Systems and Signal Processing, vol. 175,  change,” Technology Analysis & Strategic Management,
               page 8, New York, 1984.                            vol. 36, no. 8, pp. 1733–1748, 2022.




                                                          – 263 –
   302   303   304   305   306   307   308   309   310   311   312