Privacy in the era of quantum computers

Speck&Tech
Speck&TechSpeck&Tech
The privacy in the era of
quantum computers
Dr. Nicolò Leone
nicolo.leone@unitn.it
21/03/23
NanoScience
Laboratory
Quantum
computers are
great!!!
Solve different kinds of
classically unsolvable problems.
Any
downside?
The title of the presentation has
spoiled it…
Based on Public key cryptography system
Sharing of information
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography Public
Private
Connected by the
algorithm
Es: the public key =
product of the two
prime numbers
Alice Bob
Alice
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography
Encrypted with Alice Public key
Alice Bob
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography Alice decrypts the message using his private key.
Factorisation of large prime numbers.
Solved in exponential time
Alice Bob
Quantum
computing
Solve factorisation
problems
Quantum
Computers
Can solve other
crypto. problems?
Algorithm
Only a few
Future
Not enough qubit
Time
Polynomial
Security
Cannot simply take a
longer key
https://newsroom.ibm.com/media-quantum-innovation?keywords=quantum&l=100
Time is
passing.
The company are approaching the
number of necessary qubits.
https://newsroom.ibm.com/media-quantum-innovation?keywords=quantum&l=100
Post-quantum cryptography
Find problems that are still difficult to be
solved by quantum computers
Quantum cryptography
Using quantum physics to beat quantum
physics.
PRO
Post-quantum
cryptography
CONS
Security
Assumptions
Demanding
Dedicated hardware
Deployment
Software
Cost
Cheap
PRO
Quantum cryptography
Quantum key distribution
CONS
Deployment
Hardware
Cost
Expensive
Security
Quantum mechanics
Demanding
Dedicated hardware
https://www.qticompany.com/products/
BB84
First protocol proposed by
Bennett and Bressard in
1984
Quantum key
distribution
The key is not transmitted
Alice Bob
Quantum channel
Channel in which we inject
the quantum light
Quantum key
distribution
Alice Bob
Polarization
Direction of oscillation of
the electronic field
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Input randomness
It is necessary to randomly
select the base and the
digit to send
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Input randomness
Bob needs to select its
measurement basis also
randomly.
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Quantum collapse
Bob projects the
wavefunction of the
photon.
Quantum key
distribution
ℙ(V) = 1
Quantum collapse
Bob projects the
wavefunction of the
photon.
Quantum key
distribution
ℙ(V) = 1
ℙ(V) = 0.5
ℙ(H) = 0.5
Now let’s enter in
the protocol
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 0 X 1 X X 1 X 1 1 X
Alice Bob
Now let’s enter in
the protocol
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 0 X 1 X X 1 X 1 1 X
Alice Bob
Basis
announcement
They keep the runs in
which the basis are the
same.
Quantum key
distribution
Alice and Bob announce the basis
used.
Alice Bob
The key creation
Bob and Alice have
obtained the same key
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B1 B1 B2 B2
Alice Digit 0 1 1 1 1
Bob Base B1 B1 B1 B2 B2
Bob Result 0 1 1 1 1
Alice Bob
The appearance of
Eve
Now an Eavesdropper
appears and try to steal
the key.
Quantum key
distribution
Alice Bob
Eve
The appearance of
Eve
Now an Eavesdropper
appears and try to steal
the key.
Quantum key
distribution
Alice Bob
Eve
Eve performs an
intercept and
resend attack
Eve chooses the right
base.
Quantum key
distribution
Eve performs an
intercept and
resend attack
Eve chooses the wrong
base. Eve introduces
errors in the sequence.
Quantum key
distribution
Eve action
Errors are introduced in
the sequence.
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 1 X 1 X X 1 X 0 0 X
Alice Bob
Error estimation
Alice and Bob share a
piece of their key.
Quantum key
distribution
Error estimation, by comparing a
piece of the key.
Alice Bob
Error estimation
All the errors are treated
as due to Eve.
Quantum key
distribution
Errors < Threshold_value
Alice Bob
One-time pad
A method that is 100%
secure.
Quantum key
distribution Encrypted message
B = 01000010
01000010 +
01100001 =
00100011
Key = 01100001
#
00100011 +
01100001 =
01000010
Key = 01100001
# = 00100011
B
Alice Bob
One-time pad
Never reuse the same key!
Quantum key
distribution
V
V
From: http://www.cryptosmith.com/archives/70
=
=
=
V
V
From: http://www.cryptosmith.com/archives/70
=
=
Secure forever!
It is theoretically the most secure approach that can be
implemented.
The attacks are unfeasible
It is better to try to compromise Alice or Bob
Cost reduction
A As the research proceeds the cost of the QKD will
decrease
Quantum-key
distribution
Actually testing a new prototype of bidirectional QKD system
Now
Find out more SPEQK Team info@speqk.com
|ψ⟩ =
1
2
(|Thank⟩ + |you⟩)
1 de 37

Recomendados

The security of quantum cryptography por
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
4.1K vistas62 diapositivas
Zero Knowledge Proofs: What they are and how they work por
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workAll Things Open
102 vistas35 diapositivas
CS283-PublicKey.ppt por
CS283-PublicKey.pptCS283-PublicKey.ppt
CS283-PublicKey.pptMIBrand
5 vistas22 diapositivas
CS283-PublicKey.ppt por
CS283-PublicKey.pptCS283-PublicKey.ppt
CS283-PublicKey.pptShounakDas16
1 vista22 diapositivas
Public-Key Protocols por
Public-Key ProtocolsPublic-Key Protocols
Public-Key ProtocolsDavid Evans
1.2K vistas87 diapositivas
Secure Communication (Distributed computing) por
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Sri Prasanna
827 vistas60 diapositivas

Más contenido relacionado

Similar a Privacy in the era of quantum computers

Quantam cryptogrphy ppt (1) por
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
25.3K vistas22 diapositivas
Chapter 8 - Security in Computer Networks por
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksAndy Juan Sarango Veliz
99 vistas6 diapositivas
1_Protocols.pptx por
1_Protocols.pptx1_Protocols.pptx
1_Protocols.pptxAhmedAlRasheed18
13 vistas175 diapositivas
13 por
1313
13Toan Nguyen
307 vistas17 diapositivas
13 asymmetric key cryptography por
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
11.5K vistas17 diapositivas
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S... por
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...44CON
443 vistas76 diapositivas

Similar a Privacy in the era of quantum computers(12)

Quantam cryptogrphy ppt (1) por deepu427
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu42725.3K vistas
13 asymmetric key cryptography por drewz lin
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin11.5K vistas
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S... por 44CON
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
44CON443 vistas
Multi-Party Computation for the Masses por David Evans
Multi-Party Computation for the MassesMulti-Party Computation for the Masses
Multi-Party Computation for the Masses
David Evans5.3K vistas
aacyberessential3cryptography-131067585699078884.pptx por ImXaib
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib3 vistas
Zksnarks in english por Ronak Kogta
Zksnarks in englishZksnarks in english
Zksnarks in english
Ronak Kogta905 vistas
Binary System by Bray Avila por avilab
Binary System by Bray AvilaBinary System by Bray Avila
Binary System by Bray Avila
avilab911 vistas

Más de Speck&Tech

Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ... por
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Speck&Tech
74 vistas12 diapositivas
Monitorare una flotta di autobus: architettura di un progetto di acquisizione... por
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Speck&Tech
72 vistas18 diapositivas
Why LLMs should be handled with care por
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with careSpeck&Tech
89 vistas21 diapositivas
Machine learning with quantum computers por
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computersSpeck&Tech
217 vistas20 diapositivas
Give your Web App superpowers by using GPUs por
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUsSpeck&Tech
209 vistas60 diapositivas
From leaf to orbit: exploring forests with technology por
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technologySpeck&Tech
101 vistas35 diapositivas

Más de Speck&Tech(20)

Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ... por Speck&Tech
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Speck&Tech74 vistas
Monitorare una flotta di autobus: architettura di un progetto di acquisizione... por Speck&Tech
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Speck&Tech72 vistas
Why LLMs should be handled with care por Speck&Tech
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with care
Speck&Tech89 vistas
Machine learning with quantum computers por Speck&Tech
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computers
Speck&Tech217 vistas
Give your Web App superpowers by using GPUs por Speck&Tech
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUs
Speck&Tech209 vistas
From leaf to orbit: exploring forests with technology por Speck&Tech
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technology
Speck&Tech101 vistas
Innovating Wood por Speck&Tech
Innovating WoodInnovating Wood
Innovating Wood
Speck&Tech141 vistas
Behind the scenes of our everyday Internet: the role of an IXP like MIX por Speck&Tech
Behind the scenes of our everyday Internet: the role of an IXP like MIXBehind the scenes of our everyday Internet: the role of an IXP like MIX
Behind the scenes of our everyday Internet: the role of an IXP like MIX
Speck&Tech101 vistas
Architecting a 35 PB distributed parallel file system for science por Speck&Tech
Architecting a 35 PB distributed parallel file system for scienceArchitecting a 35 PB distributed parallel file system for science
Architecting a 35 PB distributed parallel file system for science
Speck&Tech129 vistas
Truck planning: how to certify the right route por Speck&Tech
Truck planning: how to certify the right routeTruck planning: how to certify the right route
Truck planning: how to certify the right route
Speck&Tech229 vistas
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ... por Speck&Tech
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...
Speck&Tech230 vistas
AI and Space: finally, no more arguing with the GPS por Speck&Tech
AI and Space: finally, no more arguing with the GPSAI and Space: finally, no more arguing with the GPS
AI and Space: finally, no more arguing with the GPS
Speck&Tech171 vistas
Space is open for business por Speck&Tech
Space is open for businessSpace is open for business
Space is open for business
Speck&Tech177 vistas
Building large science space projects por Speck&Tech
Building large science space projectsBuilding large science space projects
Building large science space projects
Speck&Tech161 vistas
Breaking the Laws of Robotics: Attacking Industrial Robots por Speck&Tech
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial Robots
Speck&Tech179 vistas
Log Stealers - Shopping time for Threat Actors! por Speck&Tech
Log Stealers - Shopping time for Threat Actors!Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!
Speck&Tech379 vistas
Design beyond deliverables por Speck&Tech
Design beyond deliverablesDesign beyond deliverables
Design beyond deliverables
Speck&Tech195 vistas
Your website is ugly - how to fix it (and why you should care) por Speck&Tech
Your website is ugly - how to fix it (and why you should care)Your website is ugly - how to fix it (and why you should care)
Your website is ugly - how to fix it (and why you should care)
Speck&Tech218 vistas
Why you should get a worse computer por Speck&Tech
Why you should get a worse computerWhy you should get a worse computer
Why you should get a worse computer
Speck&Tech228 vistas
Intelligenza artificiale: uno yin o uno yang per i diritti umani? por Speck&Tech
Intelligenza artificiale: uno yin o uno yang per i diritti umani?Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Speck&Tech175 vistas

Último

Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
130 vistas9 diapositivas
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
170 vistas29 diapositivas
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... por
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...ShapeBlue
139 vistas29 diapositivas
Cencora Executive Symposium por
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
159 vistas14 diapositivas
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...ShapeBlue
145 vistas17 diapositivas
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TShapeBlue
152 vistas34 diapositivas

Último(20)

Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue130 vistas
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc170 vistas
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... por ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue139 vistas
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue145 vistas
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue152 vistas
Business Analyst Series 2023 - Week 4 Session 7 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 vistas
The Power of Heat Decarbonisation Plans in the Built Environment por IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 vistas
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue206 vistas
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool por ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue123 vistas
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson160 vistas
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 vistas
"Surviving highload with Node.js", Andrii Shumada por Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays56 vistas
State of the Union - Rohit Yadav - Apache CloudStack por ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue297 vistas
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue147 vistas
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue184 vistas
Initiating and Advancing Your Strategic GIS Governance Strategy por Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software176 vistas
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 vistas
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue221 vistas

Privacy in the era of quantum computers