Quantum communication and quantum computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1
Abstract
The subject of quantum computing brings together ideas from classical information theory, computer science, and quantum physics. This review aims to summarize not just quantum computing, but the whole subject of quantum information theory. Information can be identified as the most general thing which must propagate from a cause to an effect. It therefore has a fundamentally important role in the science of physics. However, the mathematical treatment of information, especially information processing, is quite recent, dating from the mid-20th century. This has meant that the full significance of information as a basic concept in physics is only now being discovered. This is especially true in quantum mechanics. The theory of quantum information and computing puts this significance on a firm footing, and has led to some profound and exciting new insights into the natural world. Among these are the use of quantum states to permit the secure transmission of classical information (quantum cryptography), the use of quantum entanglement to permit reliable transmission of quantum states (teleportation), the possibility of preserving quantum coherence in the presence of irreversible noise processes (quantum error correction), and the use of controlled quantum evolution for efficient computation (quantum computation). The common theme of all these insights is the use of quantum entanglement as a computational resource.
Authors and Affiliations
Sweety Mittal
Challenges and Issues of Cluster Based Security in MANET
Abstract: Mobile ad-hoc networks are a specific kind of wireless networks that can be quickly deployed without pre- existing infrastructures. Even though there are various studies on cluster based security in MANET but t...
Network Layer Attacks: Analysis & Solutions, A Survey
Abstract - An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Also, among the wide-spread characteristics of a CR, s...
Neuron the Memory Unit of the Brain
Abstract: For long, the human brain has intrigued Researchers, Psychologist, Doctors and everyone alike. Ithas left many unanswered questions and the more it is studied the more questions arise. This paper presents acomp...
New Technique For Preventing SQL Injection Attack Based On Normal Use Model
Online applications have turned into an essential piece of our day by day lives, yet in the meantime, security of digital data put away in the web databases has been a developing concern. SQL injection attacks have been...
Improving Data Storage Security in Cloud Computing UsingElliptic Curve Cryptography
Abstract: Companies tends towards more availability, less cost, managed risk, agility- all of which areproviding by cloud computing. The cloud computing is a way to deliver IT services on demand and pay perusage, and it...