Paper
Global catastrophic risk and security implications of quantum computers
Published Sep 1, 2015 · Andrew M. Majot, Roman V Yampolskiy
Futures
Q1 SJR score
33
Citations
1
Influential Citations
Abstract
Abstract hidden due to publisher request; this does not indicate any issues with the research. Click the full text link above to read the abstract and view the original source.
Study Snapshot
Quantum computers could render current cryptographic systems obsolete, leading to potential rights violations and economic catastrophes.
PopulationOlder adults (50-71 years)
Sample size24
MethodsObservational
OutcomesBody Mass Index projections
ResultsSocial networks mitigate obesity in older groups.
Sign up to use Study Snapshot
Consensus is limited without an account. Create an account or sign in to get more searches and use the Study Snapshot.
Full text analysis coming soon...
References
Corrigendum: Responses to catastrophic AGI risk: a survey (2015 Phys. Scr. 90 018001)
Proposed responses to catastrophic AGI risk include societal measures, external constraints, and internal design changes to create safe AGIs.
2015·9citations·Kaj Sotala et al.·Physica Scripta
Physica Scripta
Measuring IPv6 adoption
IPv6 adoption varies by two orders of magnitude and is not uniform, with regional adoption not uniform and a shift in traffic, content, and performance over the last three years.
2014·162citations·Jakub Czyz et al.·ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review
Adaptation to and Recovery from Global Catastrophe
This paper develops a new method to analyze environmental and social stressors facing global catastrophe survivors, promoting successful adaptation and recovery.
2013·48citations·T. Maher et al.·Sustainability
Sustainability
The Net Delusion: The Dark Side of Internet Freedom. By Evgeny Morozov. New York: PublicAffairs, 2011. 432p. $27.95.
Digital media plays a crucial role in shaping political aspirations and inspirations among young people in authoritarian regimes, potentially promoting democratization.
2011·22citations·P. Howard·Perspectives on Politics
Perspectives on Politics
Steganography and Visual Cryptography in Computer Forensics
This paper compares steganography and visual cryptography in computer forensics, suggesting a possible algorithm combining the two for improved security, reliability, and efficiency.
2010·54citations·G. Abboud et al.·2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering
2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering
Citations
···
···
···
···