Privacy in the era of quantum computers

Speck&Tech
Speck&TechSpeck&Tech
The privacy in the era of
quantum computers
Dr. Nicolò Leone
nicolo.leone@unitn.it
21/03/23
NanoScience
Laboratory
Quantum
computers are
great!!!
Solve different kinds of
classically unsolvable problems.
Any
downside?
The title of the presentation has
spoiled it…
Based on Public key cryptography system
Sharing of information
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography Public
Private
Connected by the
algorithm
Es: the public key =
product of the two
prime numbers
Alice Bob
Alice
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography
Encrypted with Alice Public key
Alice Bob
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography Alice decrypts the message using his private key.
Factorisation of large prime numbers.
Solved in exponential time
Alice Bob
Quantum
computing
Solve factorisation
problems
Quantum
Computers
Can solve other
crypto. problems?
Algorithm
Only a few
Future
Not enough qubit
Time
Polynomial
Security
Cannot simply take a
longer key
https://newsroom.ibm.com/media-quantum-innovation?keywords=quantum&l=100
Time is
passing.
The company are approaching the
number of necessary qubits.
https://newsroom.ibm.com/media-quantum-innovation?keywords=quantum&l=100
Post-quantum cryptography
Find problems that are still difficult to be
solved by quantum computers
Quantum cryptography
Using quantum physics to beat quantum
physics.
PRO
Post-quantum
cryptography
CONS
Security
Assumptions
Demanding
Dedicated hardware
Deployment
Software
Cost
Cheap
PRO
Quantum cryptography
Quantum key distribution
CONS
Deployment
Hardware
Cost
Expensive
Security
Quantum mechanics
Demanding
Dedicated hardware
https://www.qticompany.com/products/
BB84
First protocol proposed by
Bennett and Bressard in
1984
Quantum key
distribution
The key is not transmitted
Alice Bob
Quantum channel
Channel in which we inject
the quantum light
Quantum key
distribution
Alice Bob
Polarization
Direction of oscillation of
the electronic field
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Input randomness
It is necessary to randomly
select the base and the
digit to send
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Input randomness
Bob needs to select its
measurement basis also
randomly.
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Quantum collapse
Bob projects the
wavefunction of the
photon.
Quantum key
distribution
ℙ(V) = 1
Quantum collapse
Bob projects the
wavefunction of the
photon.
Quantum key
distribution
ℙ(V) = 1
ℙ(V) = 0.5
ℙ(H) = 0.5
Now let’s enter in
the protocol
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 0 X 1 X X 1 X 1 1 X
Alice Bob
Now let’s enter in
the protocol
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 0 X 1 X X 1 X 1 1 X
Alice Bob
Basis
announcement
They keep the runs in
which the basis are the
same.
Quantum key
distribution
Alice and Bob announce the basis
used.
Alice Bob
The key creation
Bob and Alice have
obtained the same key
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B1 B1 B2 B2
Alice Digit 0 1 1 1 1
Bob Base B1 B1 B1 B2 B2
Bob Result 0 1 1 1 1
Alice Bob
The appearance of
Eve
Now an Eavesdropper
appears and try to steal
the key.
Quantum key
distribution
Alice Bob
Eve
The appearance of
Eve
Now an Eavesdropper
appears and try to steal
the key.
Quantum key
distribution
Alice Bob
Eve
Eve performs an
intercept and
resend attack
Eve chooses the right
base.
Quantum key
distribution
Eve performs an
intercept and
resend attack
Eve chooses the wrong
base. Eve introduces
errors in the sequence.
Quantum key
distribution
Eve action
Errors are introduced in
the sequence.
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 1 X 1 X X 1 X 0 0 X
Alice Bob
Error estimation
Alice and Bob share a
piece of their key.
Quantum key
distribution
Error estimation, by comparing a
piece of the key.
Alice Bob
Error estimation
All the errors are treated
as due to Eve.
Quantum key
distribution
Errors < Threshold_value
Alice Bob
One-time pad
A method that is 100%
secure.
Quantum key
distribution Encrypted message
B = 01000010
01000010 +
01100001 =
00100011
Key = 01100001
#
00100011 +
01100001 =
01000010
Key = 01100001
# = 00100011
B
Alice Bob
One-time pad
Never reuse the same key!
Quantum key
distribution
V
V
From: http://www.cryptosmith.com/archives/70
=
=
=
V
V
From: http://www.cryptosmith.com/archives/70
=
=
Secure forever!
It is theoretically the most secure approach that can be
implemented.
The attacks are unfeasible
It is better to try to compromise Alice or Bob
Cost reduction
A As the research proceeds the cost of the QKD will
decrease
Quantum-key
distribution
Actually testing a new prototype of bidirectional QKD system
Now
Find out more SPEQK Team info@speqk.com
|ψ⟩ =
1
2
(|Thank⟩ + |you⟩)
1 de 37

Recomendados

The security of quantum cryptography por
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
4.1K visualizações62 slides
Zero Knowledge Proofs: What they are and how they work por
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workAll Things Open
102 visualizações35 slides
CS283-PublicKey.ppt por
CS283-PublicKey.pptCS283-PublicKey.ppt
CS283-PublicKey.pptMIBrand
5 visualizações22 slides
CS283-PublicKey.ppt por
CS283-PublicKey.pptCS283-PublicKey.ppt
CS283-PublicKey.pptShounakDas16
1 visão22 slides
Public-Key Protocols por
Public-Key ProtocolsPublic-Key Protocols
Public-Key ProtocolsDavid Evans
1.2K visualizações87 slides
Secure Communication (Distributed computing) por
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Sri Prasanna
827 visualizações60 slides

Mais conteúdo relacionado

Similar a Privacy in the era of quantum computers

Quantam cryptogrphy ppt (1) por
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
25.3K visualizações22 slides
Chapter 8 - Security in Computer Networks por
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksAndy Juan Sarango Veliz
99 visualizações6 slides
1_Protocols.pptx por
1_Protocols.pptx1_Protocols.pptx
1_Protocols.pptxAhmedAlRasheed18
13 visualizações175 slides
13 por
1313
13Toan Nguyen
307 visualizações17 slides
13 asymmetric key cryptography por
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
11.5K visualizações17 slides
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S... por
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...44CON
443 visualizações76 slides

Similar a Privacy in the era of quantum computers(12)

Quantam cryptogrphy ppt (1) por deepu427
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu42725.3K visualizações
Chapter 8 - Security in Computer Networks por Andy Juan Sarango Veliz
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer Networks
Andy Juan Sarango Veliz99 visualizações
1_Protocols.pptx por AhmedAlRasheed18
1_Protocols.pptx1_Protocols.pptx
1_Protocols.pptx
AhmedAlRasheed1813 visualizações
13 por Toan Nguyen
1313
13
Toan Nguyen307 visualizações
13 asymmetric key cryptography por drewz lin
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin11.5K visualizações
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S... por 44CON
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
44CON443 visualizações
crypto.ppt por Sourabh97054
crypto.pptcrypto.ppt
crypto.ppt
Sourabh970544 visualizações
crypto.ppt por YousafAli83
crypto.pptcrypto.ppt
crypto.ppt
YousafAli832 visualizações
Multi-Party Computation for the Masses por David Evans
Multi-Party Computation for the MassesMulti-Party Computation for the Masses
Multi-Party Computation for the Masses
David Evans5.3K visualizações
aacyberessential3cryptography-131067585699078884.pptx por ImXaib
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib3 visualizações
Zksnarks in english por Ronak Kogta
Zksnarks in englishZksnarks in english
Zksnarks in english
Ronak Kogta905 visualizações
Binary System by Bray Avila por avilab
Binary System by Bray AvilaBinary System by Bray Avila
Binary System by Bray Avila
avilab911 visualizações

Mais de Speck&Tech

Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ... por
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Speck&Tech
74 visualizações12 slides
Monitorare una flotta di autobus: architettura di un progetto di acquisizione... por
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Speck&Tech
72 visualizações18 slides
Why LLMs should be handled with care por
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with careSpeck&Tech
89 visualizações21 slides
Machine learning with quantum computers por
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computersSpeck&Tech
217 visualizações20 slides
Give your Web App superpowers by using GPUs por
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUsSpeck&Tech
209 visualizações60 slides
From leaf to orbit: exploring forests with technology por
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technologySpeck&Tech
101 visualizações35 slides

Mais de Speck&Tech(20)

Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ... por Speck&Tech
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Speck&Tech74 visualizações
Monitorare una flotta di autobus: architettura di un progetto di acquisizione... por Speck&Tech
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Speck&Tech72 visualizações
Why LLMs should be handled with care por Speck&Tech
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with care
Speck&Tech89 visualizações
Machine learning with quantum computers por Speck&Tech
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computers
Speck&Tech217 visualizações
Give your Web App superpowers by using GPUs por Speck&Tech
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUs
Speck&Tech209 visualizações
From leaf to orbit: exploring forests with technology por Speck&Tech
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technology
Speck&Tech101 visualizações
Innovating Wood por Speck&Tech
Innovating WoodInnovating Wood
Innovating Wood
Speck&Tech141 visualizações
Behind the scenes of our everyday Internet: the role of an IXP like MIX por Speck&Tech
Behind the scenes of our everyday Internet: the role of an IXP like MIXBehind the scenes of our everyday Internet: the role of an IXP like MIX
Behind the scenes of our everyday Internet: the role of an IXP like MIX
Speck&Tech101 visualizações
Architecting a 35 PB distributed parallel file system for science por Speck&Tech
Architecting a 35 PB distributed parallel file system for scienceArchitecting a 35 PB distributed parallel file system for science
Architecting a 35 PB distributed parallel file system for science
Speck&Tech129 visualizações
Truck planning: how to certify the right route por Speck&Tech
Truck planning: how to certify the right routeTruck planning: how to certify the right route
Truck planning: how to certify the right route
Speck&Tech229 visualizações
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ... por Speck&Tech
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...
Speck&Tech230 visualizações
AI and Space: finally, no more arguing with the GPS por Speck&Tech
AI and Space: finally, no more arguing with the GPSAI and Space: finally, no more arguing with the GPS
AI and Space: finally, no more arguing with the GPS
Speck&Tech171 visualizações
Space is open for business por Speck&Tech
Space is open for businessSpace is open for business
Space is open for business
Speck&Tech177 visualizações
Building large science space projects por Speck&Tech
Building large science space projectsBuilding large science space projects
Building large science space projects
Speck&Tech161 visualizações
Breaking the Laws of Robotics: Attacking Industrial Robots por Speck&Tech
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial Robots
Speck&Tech179 visualizações
Log Stealers - Shopping time for Threat Actors! por Speck&Tech
Log Stealers - Shopping time for Threat Actors!Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!
Speck&Tech379 visualizações
Design beyond deliverables por Speck&Tech
Design beyond deliverablesDesign beyond deliverables
Design beyond deliverables
Speck&Tech195 visualizações
Your website is ugly - how to fix it (and why you should care) por Speck&Tech
Your website is ugly - how to fix it (and why you should care)Your website is ugly - how to fix it (and why you should care)
Your website is ugly - how to fix it (and why you should care)
Speck&Tech218 visualizações
Why you should get a worse computer por Speck&Tech
Why you should get a worse computerWhy you should get a worse computer
Why you should get a worse computer
Speck&Tech228 visualizações
Intelligenza artificiale: uno yin o uno yang per i diritti umani? por Speck&Tech
Intelligenza artificiale: uno yin o uno yang per i diritti umani?Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Speck&Tech175 visualizações

Último

The Role of Patterns in the Era of Large Language Models por
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
85 visualizações65 slides
"Surviving highload with Node.js", Andrii Shumada por
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
56 visualizações29 slides
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
130 visualizações9 slides
Kyo - Functional Scala 2023.pdf por
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
457 visualizações92 slides
Business Analyst Series 2023 - Week 4 Session 7 por
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7DianaGray10
139 visualizações31 slides
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
161 visualizações13 slides

Último(20)

The Role of Patterns in the Era of Large Language Models por Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li85 visualizações
"Surviving highload with Node.js", Andrii Shumada por Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays56 visualizações
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue130 visualizações
Kyo - Functional Scala 2023.pdf por Flavio W. Brasil
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil457 visualizações
Business Analyst Series 2023 - Week 4 Session 7 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 visualizações
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue161 visualizações
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash158 visualizações
Business Analyst Series 2023 - Week 4 Session 8 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10123 visualizações
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue203 visualizações
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue132 visualizações
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue206 visualizações
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue238 visualizações
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson160 visualizações
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue198 visualizações
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... por ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 visualizações
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue184 visualizações
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... por ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue159 visualizações
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 visualizações
Future of AR - Facebook Presentation por Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty64 visualizações
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... por ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue173 visualizações

Privacy in the era of quantum computers