TeQ Research – Research Tutorial for Computer Science and Technologies
  • Home Page
  • Computer Networks
    • Ad Hoc Networks
    • Network Security
    • Internet of Things (IoT)
    • Sensor Networks
  • Data Science and AI
    • Data Mining
    • Machine Learning
    • Deep Learning
    • Natural Language Processing
    • Big Data Analytics
    • Image Processing
  • Computing Technologies
    • Cloud Computing
    • Evolutionary Computing
    • Mobile Computing
    • Quantum Computing
    • Edge and Fog Computing
  • Software and Systems
    • Database Management Systems
    • Operating Systems
    • Software Engineering
    • Cybersecurity
    • Blockchain
  • Scholar Resources
    • Research Algorithms
    • Research Implementations
    • Research Grants Infos
    • Research Journals Infos
TeQ Research – Research Tutorial for Computer Science and Technologies
0
0
0
TeQ Research – Research Tutorial for Computer Science and Technologies
  • Home Page
  • Computer Networks
    • Ad Hoc Networks
    • Network Security
    • Internet of Things (IoT)
    • Sensor Networks
  • Data Science and AI
    • Data Mining
    • Machine Learning
    • Deep Learning
    • Natural Language Processing
    • Big Data Analytics
    • Image Processing
  • Computing Technologies
    • Cloud Computing
    • Evolutionary Computing
    • Mobile Computing
    • Quantum Computing
    • Edge and Fog Computing
  • Software and Systems
    • Database Management Systems
    • Operating Systems
    • Software Engineering
    • Cybersecurity
    • Blockchain
  • Scholar Resources
    • Research Algorithms
    • Research Implementations
    • Research Grants Infos
    • Research Journals Infos

Posts by tag

post-quantum cryptography

3 posts
Blockchain security
Read More
  • Blockchain
  • Software and Systems

Blockchain Security Challenges and Future Research Directions

  • October 23, 2025
  • Arun Prakasam
Introduction In today’s hyperconnected world, blockchain technology has emerged as a revolutionary framework redefining trust, transparency, and data integrity across industries. Originally introduced as the underlying technology for Bitcoin, blockchain…
Read More
Share
Post Quantum Cryptography
Read More
  • Computing Technologies
  • Cybersecurity
  • Quantum Computing

Computational Models for Quantum and Post-Quantum Cryptography

  • September 20, 2025
  • Arun Prakasam
The foundational dominance of the Turing machine as the model of computation is being challenged by advances in quantum and post-quantum cryptography. This article examines the novel computational models underpinning…
Read More
Share
Quantum Cyber Security
Read More
  • Computing Technologies
  • Quantum Computing

Key Research Areas in Quantum Cyber Security

  • May 17, 2025
  • Arun Prakasam
The topic of quantum cyber security is going through a radical change as scalable quantum computers become a reality. The computational dominance of quantum computing poses an immediate danger to…
Read More
Share
Social Links
Facebook 0
Twitter 0
LinkedIn 0
WhatsApp 0
Company
  • About Us
  • Privacy Policy
  • Terms of Service
  • Contact
Recent Post
  • Infomap Algorithm
  • Walktrap Algorithm
  • Cellular Evolutionary Algorithm (CEA)
  • Adaptive Boost Algorithm in Machine Learning
  • LightGBM Algorithm

Copyright © 2025 ExtroMind Technologies,India.

Input your search keywords and press Enter.