Evaluating Cryptographic Vulnerabilities Created by Quantum Computing in Industrial Control Systems
Michael J D Vermeer, Chad Heitzenrater, Edward Parker
Evaluating Cryptographic Vulnerabilities Created by Quantum Computing in Industrial Control Systems
Michael J D Vermeer, Chad Heitzenrater, Edward Parker
Migration to post-quantum cryptography to prepare for future capabilities of quantum computing has implications for industrial control and operational technology systems. These implications affect how system owners and operators and other stakeholders should prepare for the migration and prioritize mitigation options.
This item is not currently in-stock. It can be ordered online and is expected to ship in approx 2 weeks
Our stock data is updated periodically, and availability may change throughout the day for in-demand items. Please call the relevant shop for the most current stock information. Prices are subject to change without notice.
Sign in or become a Readings Member to add this title to a wishlist.