These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
128 related articles for article (PubMed ID: 35136223)
1. The race to save the Internet from quantum hackers. Castelvecchi D Nature; 2022 Feb; 602(7896):198-201. PubMed ID: 35136223 [No Abstract] [Full Text] [Related]
2. Audio long-read: The race to save the Internet from quantum hackers. Castelvecchi D; Thompson B Nature; 2022 Feb; ():. PubMed ID: 35228731 [No Abstract] [Full Text] [Related]
3. Hackers against technology: Critique and recuperation in technological cycles. Maxigas Soc Stud Sci; 2017 Dec; 47(6):841-860. PubMed ID: 29082830 [TBL] [Abstract][Full Text] [Related]
4. Academic Information Security Researchers: Hackers or Specialists? Dadkhah M; Lagzian M; Borchardt G Sci Eng Ethics; 2018 Apr; 24(2):785-790. PubMed ID: 28397172 [TBL] [Abstract][Full Text] [Related]
5. It may be fast but is it safe? Ways to protect your DSL system from hackers. Bergeron BP Postgrad Med; 2000 Jul; 108(1):31-2. PubMed ID: 10914118 [No Abstract] [Full Text] [Related]
6. Security on the Internet: is your system vulnerable? Neray P Nurs Manage; 1997 Jul; 28(7):64. PubMed ID: 9325940 [TBL] [Abstract][Full Text] [Related]
7. Flow-based model of computer hackers' motivation. Voiskounsky AE; Smyslova OV Cyberpsychol Behav; 2003 Apr; 6(2):171-80. PubMed ID: 12804029 [TBL] [Abstract][Full Text] [Related]
8. Think Like a Hacker. Khera M J Diabetes Sci Technol; 2017 Mar; 11(2):207-212. PubMed ID: 27920270 [TBL] [Abstract][Full Text] [Related]
9. Safe and efficient use of the Internet. Downes PK Br Dent J; 2007 Jul; 203(1):11-22. PubMed ID: 17632481 [TBL] [Abstract][Full Text] [Related]
10. Proposal for a security management in cloud computing for health care. Haufe K; Dzombeta S; Brandis K ScientificWorldJournal; 2014; 2014():146970. PubMed ID: 24701137 [TBL] [Abstract][Full Text] [Related]
11. Key reconciliation for high performance quantum key distribution. Martinez-Mateo J; Elkouss D; Martin V Sci Rep; 2013; 3():1576. PubMed ID: 23546440 [TBL] [Abstract][Full Text] [Related]
12. Cybersecurity in the Clinical Setting: Nurses' Role in the Expanding "Internet of Things". Billingsley L; McKee SA J Contin Educ Nurs; 2016 Aug; 47(8):347-9. PubMed ID: 27467307 [TBL] [Abstract][Full Text] [Related]
13. Quantum digital signatures without quantum memory. Dunjko V; Wallden P; Andersson E Phys Rev Lett; 2014 Jan; 112(4):040502. PubMed ID: 24580426 [TBL] [Abstract][Full Text] [Related]
14. Secure device-independent quantum key distribution with causally independent measurement devices. Masanes L; Pironio S; Acín A Nat Commun; 2011; 2():238. PubMed ID: 21407204 [TBL] [Abstract][Full Text] [Related]
15. A novel image encryption scheme based on quantum dynamical spinning and rotations. Khan M; Waseem HM PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455 [TBL] [Abstract][Full Text] [Related]
16. Is it safe? Security speed bumps on the information highway. Bergeron BP J Med Pract Manage; 2001; 16(6):297-300. PubMed ID: 11497309 [TBL] [Abstract][Full Text] [Related]
17. Short Review on Quantum Key Distribution Protocols. Giampouris D Adv Exp Med Biol; 2017; 988():149-157. PubMed ID: 28971396 [TBL] [Abstract][Full Text] [Related]
18. Enhanced quantum signature scheme using quantum amplitude amplification operators. Elias B; Younes A PLoS One; 2021; 16(10):e0258091. PubMed ID: 34624046 [TBL] [Abstract][Full Text] [Related]
19. Technology. IT forecast: warming, with a chance of cloud computing. Page D Hosp Health Netw; 2011 Jul; 85(7):17-8. PubMed ID: 21834429 [No Abstract] [Full Text] [Related]
20. The quantum internet has arrived (and it hasn't). Castelvecchi D Nature; 2018 Feb; 554(7692):289-292. PubMed ID: 32094747 [No Abstract] [Full Text] [Related] [Next] [New Search]