Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-4rdrl Total loading time: 0 Render date: 2024-06-27T15:42:17.744Z Has data issue: false hasContentIssue false

Bibliography

from Appendices

Published online by Cambridge University Press:  18 November 2021

Chris Jay Hoofnagle
Affiliation:
University of California, Berkeley
HTML view is not available for this content. However, as you have access to this content, a full PDF is available via the 'Save PDF' action button.

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2022
Creative Commons
Creative Common License - CCCreative Common License - BYCreative Common License - NCCreative Common License - ND
This content is Open Access and distributed under the terms of the Creative Commons Attribution licence CC-BY-NC-ND 4.0 https://creativecommons.org/cclicenses/

References

23andMe (n.d.). “Choosing Which Reports to View” (). Last accessed March 26, 2021. customercare.23andme.com/hc/en-us/articles/212195308-Choosing-Which-Reports-to-View.Google Scholar
4iQ (May 2020). “2020 4iQ Identity Breach Report.”Google Scholar
Aaronson, Scott (March 2005). “Guest Column: NP-Complete Problems and Physical Reality.” SIGACT News 36.1, pp. 3052. doi.org/10.1145/1052796.1052804.Google Scholar
Aaronson, Scott (March 2008). “The Limits of Quantum.” Scientific American 298.3, pp. 6269.CrossRefGoogle ScholarPubMed
Aaronson, Scott (2013). Quantum Computing since Democritus. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Abbott, B. P. et al. (February 2016). “Observation of Gravitational Waves From a Binary Black Hole Merger.” Physical Review Letters 116.061102. link.aps.org/doi/10.1103/PhysRevLett.116.061102.Google Scholar
Acin, A. and Masanes, L. (2016). “Certified Randomness in Quantum Physics.” Nature 540.7632, pp. 213219.Google Scholar
Adleman, Leonard (1994). “Molecular Computation of Solutions to Combinatorial Problems.” Science 266.5187, pp. 10211024. science.sciencemag.org/content/266/5187/1021.Google Scholar
Adleman, Leonard (2011). “Pre-RSA Days: History and Lessons.” In: ACM Turing Award Lectures. New York: Association for Computing Machinery, pp. 2002. doi.org/10.1145/1283920.1961904.Google Scholar
Adleman, L. M., Rivest, R. L., and Shamir, A. (September 1983). Cryptographic Communications System and Method. US Patent No. 4,405,829. Patent filed September 14, 1977. www.google.com/patents/US4405829.Google Scholar
Aggarwal, Vinod K. and Reddie, Andrew W. (2018). “Comparative Industrial Policy and Cybersecurity: a Framework for Analysis.” Journal of Cyber Policy 3.3, pp. 291305.CrossRefGoogle Scholar
Agrawal, Manindra, Kayal, Neeraj, and Saxena, Nitin (June 2004). “Primes Is in P.” Annals of Mathematics 160. Godel Prize, Fulkerson Prize, pp. 781793. www.microsoft.com/en-us/research/publication/primes-is-in-p/.Google Scholar
Aliberti, Keith and Bruen, Thomas (2006). “Quantum Computation and Communication.” Army Logistician 38.5, pp. 4248.Google Scholar
Alper, Alexandra (December 2019). “US Finalizing Rules to Limit Sensitive Tech Exports to China, Others.” Reuters. www.reuters.com/article/us-usa-tech-china-exclusive-idUSKBN1YL1B8.Google Scholar
Alpert, Carol Lynn, Edwards, Emily, and Freericks, James (May 13, 2020). Key Concepts for Future QIS Learners. Workshop Output. qis-learners.research.illinois.edu/.Google Scholar
Altman, Ehud et al. (December 14, 2019). “Quantum Simulators: Architectures and Opportunities.” arxiv.org/abs/1912.06938.Google Scholar
Alzar, Carlos L. Garrido (December 13, 2019). “Compact Chip-Scale Guided Cold Atom Gyrometers for Inertial Navigation: Enabling Technologies and Design Study.” AVS Quantum Science. avs.scitation.org/doi/10.1116/1.5120348.Google Scholar
American Physical Society (n.d.). “Robert A. Millikan” (). Last accessed December 25, 2019. www.aps.org/programs/outreach/history/historicsites/millikan.cfm.Google Scholar
Ananthaswamy, A. (2018). Through Two Doors at Once: The Elegant Experiment That Captures The Enigma of Our Quantum Reality. New York: Penguin Publishing Group. books.google.com/books?id=bGNKDwAAQBAJ.Google Scholar
Anqi, Huang et al. (2018). “Implementation Vulnerabilities in General Quantum Cryptography.” New Journal of Physics 20.10.Google Scholar
Apple Computer (November 10, 2020). “Apple Unleashes M1.” www.apple.com/newsroom/2020/11/apple-unleashes-m1/.Google Scholar
Applegate, David L., Bixby, Robert E., Chvátal, Vašek, Cook, William, et al. (2009). “Certification of an Optimal TSP Tour through 85,900 Cities.” Operations Research Letters 37.1, pp. 1115. www.sciencedirect.com/science/article/pii/S0167637708001132.Google Scholar
Applegate, David L., Bixby, Robert E., Chvátal, Vašek, and Cook, William J. (2006). The Traveling Salesman Problem. Princeton, NJ: Princeton University Press.Google Scholar
Aramon, Maliheh et al. (April 2019). “Physics-Inspired Optimization for Quadratic Unconstrained Problems Using a Digital Annealer.” Frontiers in Physics 7, pp. 48.CrossRefGoogle Scholar
Arias, Elisa Felicitas and Petit, Gérard (2019). “The Hyperfine Transition for The Definition of The Second.” Annalen Der Physik 531.5, pp. 1900068. onlinelibrary.wiley.com/doi/abs/10.1002/andp.201900068.Google Scholar
Arkell, Harriet (September 10, 2014). “Death From above without Warning: 70 Years after The First One Fell, Interactive Map Reveals Just Where Hitler's V2 Rockets Killed Thousands of British Civilians in Final Months of WW2.” Daily Mail. www.dailymail.co.uk/news/article-2750353/Interactive-map-reveals-hundreds-sites-Hitler-s-V2-rockets-killed-thousands-British-civilians-final-months-WW2.html.Google Scholar
Arnbak, A. M. and van Eijk, N. A. N. M. (2012). Certificate Authority Collapse: Regulating Systemic Vulnerabilities in The HTTPS Value Chain. Arlington, VA: Telecommunications Policy Research Conference.Google Scholar
Arute, Frank et al. (2019). “Quantum Supremacy Using a Programmable Superconducting Processor.” Nature 574.7779, pp. 505510. doi.org/10.1038/s41586-019-1666-5.CrossRefGoogle ScholarPubMed
Ashida, Yuya et al. (2019). “Molybdenum-Catalysed Ammonia Production with Samarium Diiodide and Alcohols or Water.” Nature 568.7753, pp. 536540. doi.org/10.1038/s41586-019-1134-2.Google Scholar
Bailey, Dennis (2004). The Open Society Paradox: Why The 21st Century Calls for More Openness –Not Less. Washington, D.C.: Brassey's.Google Scholar
Baloo, Jaya (June 30, 2019). “KPN's Quantum Journey, Cyberweek 2019, Tel Aviv, Israel.” YouTube video. www.youtube.com/watch?v=ePZFBxX3DnY.Google Scholar
Barker, Elaine and Kelsey, John (March 2007). Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised). Last accessed May 30, 2020. National Institute of Standards and Technology. csrc.nist.gov/publications/detail/sp/800-90/revised/archive/2007-03-14.Google Scholar
Barlow, John Perry (1996). “A Declaration of The Independence of Cyberspace.” Journal. homes.eff.org/~barlow/Declaration-Final.html.CrossRefGoogle Scholar
Barzanjeh, Shabir et al. (February 2015). “Microwave Quantum Illumination.” Physical Review Letters 114 (8). pp. 080503. link.aps.org/doi/10.1103/PhysRevLett.114.080503.Google Scholar
Batten, Alan H. (September 26, 2005). “Subtle Are Einstein's Thoughts.” Physics World 18.9, pp. 16. physicsworld.com/a/subtle-are-einsteins-thoughts/.Google Scholar
Bayer, Ronald and Galea, Sandro (2015). “Public Health in The Precision-Medicine Era.” New England Journal of Medicine 373.6, pp. 499501.Google Scholar
Bell, John Stewart (1964). “On The Einstein Podolsky Rosen Paradox.” Physics 1.3, pp. 195290. cds.cern.ch/record/111654/files/vol1p195-200_001.pdf.Google Scholar
Bellovin, Steven M. (June 1, 2000). “Wiretapping The Net.” www.nae.edu/7430/WiretappingtheNet.Google Scholar
ben-Aaron, Diana (April 1985). “Weizenbaum Examines Computers and Society.” The Tech 105 (16).Google Scholar
Ben-Atar, Doron S. (2004). Trade Secrets: Intellectual Piracy and The Origins of American Industrial Power. New Haven, CT: Yale University Press. books.google.com/books?id=dHD1mAEACAAJ.Google Scholar
Benioff, Paul (1980). “The Computer As a Physical System: A Microscopic Quantum Mechanical Hamiltonian Model of Computers As Represented by Turing Machines.” Journal of Statistical Physics 22.5, pp. 563591.Google Scholar
Benioff, Paul (1982a). “Quantum Mechanical Hamiltonian Models of Discrete Processes That Erase Their Own Histories: Application to Turing Machines.” International Journal of Theoretical Physics 21.3, pp. 177201.Google Scholar
Benioff, Paul (1982b). “Quantum Mechanical Models of Turing Machines That Dissipate No Energy.” Physical Review Letters 48.1581.Google Scholar
Bennett, C. H. (November 1973). “Logical Reversibility of Computation.” IBM Journal of Research and Development 17.6, pp. 525532. doi.org/10.1147/rd.176.0525.Google Scholar
Bennett, C. H. and Brassard, G. (1984). “Quantum Cryptography: Public Key Distribution and Coin Tossing,” pp. 175179. researcher.watson.ibm.com/researcher/files/us-bennetc/BB84highest.pdf.Google Scholar
Bennett, Charles H. et al. (1993). “Teleporting an Unknown Quantum State via Dual Classical and Einstein-Podolsky-Rosen Channels.” Physical Review Letters 70.13, pp. 18951899.Google Scholar
Beranek, Leo (2011). “Founding a Culture of Engineering Creativity.” In: A Culture of Innovation: Insider Accounts of Computing and Life at BBN: A Sixty Year Report, 18 October 1948 to 1 July 2010. East Sandwich, Massachusetts: Waterside Publishing. www.cbi.umn.edu/hostedpublications/pdf/CultureInnovation_bbn.pdf.Google Scholar
Berger, Abi (2002). “Magnetic Resonance Imaging.” BMJ Clinical Research Ed. 324.7328, pp. 35.Google Scholar
Bernstein, Daniel J. (2009). “Introduction to Post-Quantum Cryptography.” In: Post-Quantum Cryptography. Berlin, Heidelberg: Springer, pp. 114.Google Scholar
Bernstein, Daniel J. and Lange, T. (2017). “Post-Quantum Cryptography.” Nature 549.7671, pp. 188194.Google Scholar
Berry, Michael W. et al. (2008). Survey of Text Mining II: Clustering, Classification, and Retrieval. Springer.CrossRefGoogle Scholar
Berthiaume, André and Brassard, Gilles (1994). “Oracle Quantum Computing.” Journal of Modern Optics 41.12, pp. 25212535. doi.org/10.1080/09500349414552351.Google Scholar
Bierhorst, Peter et al. (2018). “Experimentally Generated Randomness Certified by The Impossibility of Superluminal Signals.” Nature 556.7700, pp. 223226.CrossRefGoogle ScholarPubMed
Biological Nitrogen Fixation: Research Challenges – A Review of Research Grants Funded by the US Agency for International Development (1994). Washington, DC: The National Academies Press. www.nap.edu/catalog/9288/biological-nitrogen-fixation-research-challenges-a-review-of-research-grants.Google Scholar
Black, John, Cochran, Martin, and Highland, Trevor (2006). “A Study of The MD5 Attacks: Insights and Improvements.” Fast Software Encryption, 13th International Workshop, FSE 2006. Vol. 4047. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, pp. 262277. iacr.org/archive/fse2006/40470265/40470265.pdf.Google Scholar
Blakeslee, Sandra (June 1, 1984). “Nuclear Spill at Juarez Looms As One of The Worst.” New York Times. www.nytimes.com/1984/05/01/science/nuclear-spill-at-juarez-looms-as-one-of-worst.html.Google Scholar
Blakley, George Robert (1979). “Safeguarding Cryptographic Keys.” International Workshop on Managing Requirements Knowledge. IEEE Computer Society. Los Alamitos, CA: IEEE Computer Society, pp. 313318.Google Scholar
Blanchette, Jean-François (2012). Burdens of Proof: Cryptographic Culture and Evidence Law in The Age of Electronic Documents. Cambridge, MA: The MIT Press. www.jstor.org/stable/j.ctt5vjpdh.CrossRefGoogle Scholar
Boaron, Alberto et al. (2018). “Secure Quantum Key Distribution Over 421 Km of Optical Fiber.” Physical Review Letters 121.19, pp. 190502.Google Scholar
Boneh, Dan and Franklin, Matthew K. (2001). “Identity-Based Encryption From The Weil Pairing.” Advances in Cryptology –Proceedings of CRYPTO 2001, pp. 213229.CrossRefGoogle Scholar
Bongs, Kai et al. (2019). “Taking Atom Interferometric Quantum Sensors From The Laboratory to Real-World Applications.” Nature Reviews Physics 1.12, pp. 731739. doi.org/10.1038/s42254019-0117-4.Google Scholar
Bonneau, J., Herley, C., et al. (2012). “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.” 2012 IEEE Symposium on Security and Privacy. San Francisco, CA, pp. 553567.Google Scholar
Bonneau, J., Herley, Cormac, et al. (June 2015). “Passwords and The Evolution of Imperfect Authentication.” Communications of The Association for Computing Machinery 58.7, pp. 7887. doi.org/10.1145/2699390.Google Scholar
Boothby, Bill (2017). “Space Weapons and The Law.” International Law Studies 93, pp. 179214.Google Scholar
Boudot, Fabrice et al. (February 28, 2020). “Factorization of RSA-250.” Cado-Nfs-Discussion. lists.gforge.inria.fr/pipermail/cado-nfs-discuss/2020-February/001166.html.Google Scholar
Braithwaite, Matt (July 7, 2016). “Experimenting with Post-Quantum Cryptography.” Google Security Blog. security.googleblog.com/2016/07/experimenting-with-post-quantum.html.Google Scholar
Brassard, G. (2005). “Brief History of Quantum Cryptography: a Personal Perspective.” IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005. Updated version located at arxiv.org/abs/quant-ph/0604072v1, pp. 1923.CrossRefGoogle Scholar
Bratley, Paul and Millo, Jean (1972). “Computer Recreations: Self-Reproducing Programs.” Software – Practice and Experience 2, pp. 397400. onlinelibrary.wiley.com/doi/abs/10.1002/spe.4380020411.Google Scholar
Briegel, H. J. et al. (1998). “Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication.” Physical Review Letters 81.26, pp. 59325935.Google Scholar
Brown, I. David (2016). The Chemical Bond in Inorganic Chemistry: The Bond Valence Model, 2nd ed. Oxford University Press.Google Scholar
Brumfiel, Geoff (February 2016). “US Navy Brings Back Navigation by The Stars for Officers.” National Public Radio.Google Scholar
Brumfiel, Geoff (2019). “India Claims Successful Test Of Anti-Satellite Weapon.” National Public Radio: All Things Considered.Google Scholar
Buchanan, Ben (2020). The Hacker and The State: Cyber Attacks and The New Normal of Geopolitics. Cambridge, MA: Harvard University Press.Google Scholar
Buchner, M. et al. (2018). “Tutorial: Basic Principles, Limits of Detection, and Pitfalls of Highly Sensitive SQUID Magnetometry for Nanomagnetism and Spintronics.” Journal of Applied Physics 124.16.CrossRefGoogle Scholar
Budker, Dmitry and Romalis, Michael (April 1, 2007). “Optical Magnetometry.” Journal. escholarship.org/uc/item/1c79s7vb.Google Scholar
Bunch, Bryan H. (2004). The History of Science and Technology: A Browser's Guide to The Great Discoveries, Inventions, and The People Who Made Them, From The Dawn of Time to Today. Boston, MA: Houghton Mifflin.Google Scholar
Bundesministerium für Bildung und Forschung (January 2020). “Die Zweite Quantenrevolution Maßgeblich Mitgestalten.”Google Scholar
Bureau International des Poids et Mesures (July 2017). “50th Anniversary of The Adoption of The Atomic Definition of The Second.” Last accessed October 9, 2020. www.bipm.org/en/news/full-stories/2017-07-definition-second.html.Google Scholar
Bureau International des Poids et Mesures (n.d.). The International System of Units. www.bipm.org/en/publications/si-brochure/.Google Scholar
Bush, V. (1931). “The Differential Analyzer. A New Machine for Solving Differential Equations.” Journal of The Franklin Institute 212.4, pp. 447488. www.sciencedirect.com/science/article/pii/S0016003231906169.Google Scholar
Bush, V., Gage, F. D., and Stewart, H. R. (1927). “A Continuous Integraph.” Journal of The Franklin Institute 203.1, pp. 6384. www.sciencedirect.com/science/article/pii/S0016003227900970.Google Scholar
C4ADS (April 16, 2019). “Above Us Only Stars: Exposing GPS Spoofing in Russia and Syria.” www.c4reports.org/aboveusonlystars.Google Scholar
Calo, Ryan (2018). “Artificial Intelligence Policy: A Primer and Roadmap.” Bologna Law Review. bolognalawreview.unibo.it/article/view/8670.Google Scholar
Capra, Fritjof (1975). Tao of Physics: an Exploration of The Parallels between Modern Physics and Eastern Mysticism. 2nd ed. New Science Library. Boston, MA: Shambhala.Google Scholar
Caro, Jose et al. (2011). “GPS Space Segment.” Navipedia. Last edited June 19, 2018; last accessed October 18, 2020. gssc.esa.int/navipedia/index.php/GPS_Space_Segment.Google Scholar
Carreyrou, John (2018). Bad Blood: Secrets and Lies in a Silicon Valley Startup. New York: Alfred A. Knopf.Google Scholar
Catalog Technologies, Inc. (n.d.). “Catalog” (). Last accessed January 12, 2021. www.catalogdna.com.Google Scholar
Center for Long Term Cybersecurity (2019). “Cybersecurity Scenarios 2025.”Google Scholar
Chang, C. W. et al. (2019). “Quantum-Enhanced Noise Radar.” Applied Physics Letters 114.11, pp. 112601.CrossRefGoogle Scholar
Chang, Weng-Long, Guo, Minyi, and Ho, M. S. (2005). “Fast Parallel Molecular Algorithms for DNA-Based Computation: Factoring Integers.” IEEE Transactions on NanoBioscience 4.2, pp. 149163.Google Scholar
Chen, Yu-Ao et al. (2021). “An Integrated Space-To-Ground Quantum Communication Network Over 4,600 Kilometres.” Nature 589.7841, pp. 214219.Google Scholar
Cheng, Kai-Wen and Tseng, Chien-Cheng (June 5, 2002). “Quantum Plain and Carry Look-Ahead Adders.” ArXiv.org Quantum Physics. arxiv.org/abs/quant-ph/0206028.Google Scholar
Chiang, Ted (2019). Exhalation. New York: Alfred A. Knopf.Google Scholar
Cho, A. (2020). “The Short, Strange Life of Quantum Radar.” Science 369.6511, pp. 15561557.Google Scholar
Chou, C. W. et al. (2010). “Optical Clocks and Relativity.” Science 329.5999, pp. 16301633. science.sciencemag.org/content/329/5999/1630.CrossRefGoogle ScholarPubMed
Church, Alonzo (1936). “An Unsolvable Problem of Elementary Number Theory.” American Journal of Mathematics 58.2, pp. 345363. www.jstor.org/stable/2371045.Google Scholar
Chwala, A. et al. (2012). “Full Tensor SQUID Gradiometer for Airborne Exploration.” ASEG Extended Abstracts 2012.1, pp. 14.Google Scholar
Clarivate (2021). “What Is Web of Science Core Collection?” clarivate.libguides.com/woscc/basics.Google Scholar
Clark, David D. (2019). Designing an Internet. Cambridge, MA: MIT Press.Google Scholar
Clymer, A. Ben (1993). “The Mechanical Analog Computers of Hannibal Ford and William Newell.” IEEE Annals of The History of Computing 15.2, pp. 1934.Google Scholar
Cocks, Clifford (2001). “An Identity Based Encryption Scheme Based on Quadratic Residues.” Proceedings of The 8th IMA International Conference on Cryptography and Coding. Berlin, Heidelberg: Springer.Google Scholar
Congressional Research Service (2020). “US Research and Development Funding and Performance: Fact Sheet.”Google Scholar
Cook, William J. (2012). In Pursuit of The Traveling Salesman. Princeton, NJ: Princeton University Press.Google Scholar
Copeland, B. Jack, ed. (2005). Alan Turing's Automatic Computing Engine. Oxford University Press.Google Scholar
Copeland, René (October 17, 2017). “The International Quantum Race.” The Coming Quantum Revolution: Security and Policy Implications, Video Conference proceedings.Google Scholar
Coppersmith, D. (May 1994). “The Data Encryption Standard (DES) and Its Strength against Attacks.” IBM Journal of Research and Development 38.3, pp. 243250.Google Scholar
Cory, David G., Fahmy, Amr F., and Havel, Timothy F. (1997). “Ensemble Quantum Computing by NMR Spectroscopy.” Proceedings of The National Academy of Sciences 94.5, pp. 16341639. www.pnas.org/content/94/5/1634.Google Scholar
Cox, K. C. et al. (2018). “Quantum-Limited Atomic Receiver in The Electrically Small Regime.” Physical Review Letters 121.11, pp. 110502.Google Scholar
Crane, Leah (June 24, 2020). “Honeywell Claims It Has Built The Most Powerful Quantum Computer Ever.” New Scientist. www.newscientist.com/article/2246940-honeywell-claims-it-has-built-the-most-powerful-quantum-computer-ever/.Google Scholar
Creery, Madison (June 26, 2019). “The Russian Edge in Electronic Warfare.” Georgetown Security Studies Review. georgetownsecuritystudiesreview.org/2019/06/26/the-russian-edge-in-electronic-warfare/.Google Scholar
Cross, A. W. et al. (2019). “Validating Quantum Computers Using Randomized Model Circuits.” Physical Review A 100.3.Google Scholar
Curtis E. LeMay Center for Doctrine Development and Education (March 13, 2019). “Introduction to Targeting.” www.doctrine.af.mil/Portals/61/documents/Annex_3-60/3-60-D01-Target-Intro.pdf.Google Scholar
Cybersecurity and Infrastructure Security Agency (January 5, 2021). “Joint Statement by The Federal Bureau of Investigation (FBI), The Cybersecurity and Infrastructure Security Agency (CISA), The Office of The Director of National Intelligence (ODNI), and The National Security Agency (NSA).” www.cisa.gov/news/2021/01/05/joint-statement-federal-bureau-investigation-fbi-cybersecurity-and-infrastructure.Google Scholar
D-Wave Systems Inc. (May 29, 2019). “Quantum Experiences: Applications and User Projects on D-Wave.” www.youtube.com/watch?v=NTnu1UiFXVo.Google Scholar
D-Wave Systems Inc. (September 29, 2020). “D-Wave Announces General Availability of First Quantum Computer Built for Business.” www.dwavesys.com/press-releases/d-wave-announces-general-availability-first-quantum-computer-built-business.Google Scholar
Dam, Kleese K. van (February 5, 2020). From Long-Distance Entanglement to Building a Nationwide Quantum Internet: Report of The DOE Quantum Internet Blueprint Workshop. Tech. rep. BNL-216179-2020-FORE. United States.Google Scholar
Danzig, Richard (May 2018). “Technology Roulette: Managing Loss of Control As Many Militaries Pursue Technological Superiority.” CNAS. www.cnas.org/publications/reports/technology-roulette.Google Scholar
Dasgupta, Subrata (2014). It Began with Babbage: The Genesis of Computer Science. Oxford University Press.Google Scholar
Dattani, Nikesh S. and Bryans, Nathaniel (2014). “Quantum Factorization of 56153 with Only 4 Qubits.” arxiv.org/abs/1411.6758.Google Scholar
Davies, William (2020). This Is Not Normal: The Collapse of Liberal Britain. Verso. www.versobooks.com/books/3628-this-is-not-normal.Google Scholar
Davisson, Clinton J. and Germer, Lester H. (1928). “Reflection of Electrons by a Crystal of Nickel.” Proceedings of The National Academy of Sciences of The United States of America 14 (4), pp. 317322.Google Scholar
Dean, Jeffrey (November 10, 2010). “Building Software Systems At Google and Lessons Learned.” Talk at Stanford University. www.youtube.com/watch?v=modXC5IWTJI.Google Scholar
Defense Advanced Research Projects Agency (2020). “Quantum Sensing and Computing.” www.darpa.mil/attachments/QuantumSensingLayout2.pdf.Google Scholar
Degen, C. L., Reinhard, F., and Cappellaro, P. (July 25, 2017). “Quantum Sensing.” Reviews of Modern Physics 89.3, pp. 035002.Google Scholar
Department of Commerce, Bureau of Industry and Security (November 19, 2018). “Review of Controls for Certain Emerging Technologies.” Federal Register 83.Google Scholar
Department of Homeland Security, US Coast Guard (2018). “GPS Problem Reporting.” navcen.uscg.gov/?pageName=gpsUserInput.Google Scholar
Deutsch, David (1985). “Quantum Theory, The Church–Turing Principle and The Universal Quantum Computer.” Proceedings of The Royal Society of London. A. Mathematical and Physical Sciences 400.1818, pp. 97117.Google Scholar
Didion, Joan (2003). Where I Was From. New York: Knopf.Google Scholar
Diffie, Whitfield and Hellman, Martin E (1976). “New Directions in Cryptography.” IEEE Transactions on Information Theory 22.6, pp. 644654.Google Scholar
Diffie, Whitfield and Hellman, Martin E (1977). “Special Feature Exhaustive Cryptanalysis of The NBS Data Encryption Standard.” Computer 10.6, pp. 7484.Google Scholar
Dinolt, George et al. (September 2010). Parallelizing SHA-256, SHA-1 MD5 and AES on The CellBroadbandEngine. Tech. rep. NPS-CS-10-11. Monterey, CA: Naval Postgraduate School. calhoun.nps.edu/handle/10945/551 Google Scholar
Director of National Intelligence (2019). “What Is Intelligence?” www.dni.gov/index.php/what-we-do/what-is-intelligence.Google Scholar
DiVincenzo, David P. (1997). “Topics in Quantum Computers.” In: Mesoscopic Electron Transport, ed. Sohn, Lydia L., Kouwenhoven, Leo P., and Schön, Gerd. Dordrecht: Springer Netherlands, pp. 657677. doi.org/10.1007/978-94-015-8839-3_18.Google Scholar
DiVincenzo, David P. (September 2000). “The Physical Implementation of Quantum Computation.” Fortschritte Der Physik 48.9–11, pp. 771783. dx.doi.org/10.1002/1521-3978(200009)48:9/11%3C771::AID-PROP771%3E3.0.CO;2-E.Google Scholar
Doudna, Jennifer A. and Charpentier, Emmanuelle (2014). “The New Frontier of Genome Engineering with CRISPR-Cas9.” Science 346.6213, pp. 1258096.Google Scholar
Dowling, J. P. and Milburn, G. J. (2003). “Quantum Technology: The Second Quantum Revolution.” Philosophical Transactions of The Royal Society of London A: Mathematical, Physical and Engineering Sciences 361.1809, pp. 16551674.Google Scholar
Doyle, Leonard (April 28, 1993). “Business Spy War Erupts between US and France: Paris Forced to Come Clean on Hi-Tech Dirty Tricks.” The Independent. tinyurl.com/4jxv6fzr.Google Scholar
Duke, J., Friedlin, J., and Ryan, P. (2011). “A Quantitative Analysis of Adverse Events and ‘Overwarning’ in Drug Labeling.” Archives of Internal Medicine 171.10, pp. 944946.Google Scholar
Dworkin, Morris J. et al. (November 26, 2001). Advanced Encryption Standard (AES). Tech. rep. FIPS-197. Gaithersburg, MD: National Institute of Standards and Technology. www.nist.gov/publications/advanced-encryption-standard-aes.Google Scholar
Dyakonov, Mikhail (2019). “When Will Useful Quantum Computers Be Constructed? Not in The Foreseeable Future, This Physicist Argues. Here's Why: The Case against: Quantum Computing.” IEEE Spectrum 56.3.Google Scholar
Dyakonov, Mikhail (2020). Will We Ever Have a Quantum Computer? Berlin: Springer.Google Scholar
Einstein, Albert (1905). “Über Einen Die Erzeugung Und Verwandlung Des Lichtes Betreffenden Heuristischen Gesichtspunkt (On The Production and Transformation of Light From a Heuristic Viewpoint).” Annalen Der Physik (1900) (Series 4) 322.6, pp. 132148. www.gsjournal.net/Science-Journals/Essays/View/2490;%20www.gsjournal.net/Science-Journals/Essays/View/2491;%20www.zbp.univie.ac.at/einstein/einstein1.pdf.Google Scholar
Einstein, Albert and Born, Max (1971). The Born–Einstein Letters: Correspondence between Albert Einstein and Max and Hedwig Born From 1916–1955, with Commentaries by Max Born. London: Macmillan.Google Scholar
Einstein, Albert and Born, Max (2005). The Born–Einstein Letters 1916–1955: Friendship, Politics and Physics in Uncertain Times. London: Macmillan.Google Scholar
Einstein, Albert, Born, Max, and Heisenberg, Werner (2005). Albert Einstein Max Born, Briefwechsel 1916–1955: Mit Einem Geleitwort von Bertrand Russell (Deutsch). Munich: Langen Müller, pp. 52.Google Scholar
Einstein, Albert and Infeld, Leopold (1938). The Evolution of Physics: The Growth of Ideas From Early Concepts to Relativity and Quanta. Cambridge: Cambridge University Press.Google Scholar
Einstein, Albert, Podolsky, Boris, and Rosen, Nathan (May 15, 1935). “Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?Physical Review 47, pp. 777780.Google Scholar
Ekerå, Martin and Håstad, Johan (2017). “Quantum Algorithms for Computing Short Discrete Logarithms and Factoring RSA Integers.” International Workshop on Post-Quantum Cryptography. Berlin: Springer, pp. 347363.Google Scholar
Ekert, Artur K. (August 1991). “Quantum Cryptography Based on Bell's Theorem.” Physical Review Letters 67 (6), pp. 661663. link.aps.org/doi/10.1103/PhysRevLett.67.661.Google Scholar
Electronic Frontier Foundation, ed. (1998). Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. en. San Francisco, CA: Electronic Frontier Foundation.Google Scholar
Elfving, V. E. et al. (2020). “How Will Quantum Computers Provide an Industrially Relevant Computational Advantage in Quantum Chemistry?” arxiv.org/abs/2009.12472.Google Scholar
Elliott, Chip and Yeh, Henry (July 2007). DARPA Quantum Network Testbed. AFRL-IF-RS-TR-2007-180. Cambridge, MA: BBN Technologies. www.dtic.mil/docs/citations/ADA471450.Google Scholar
Ellis, James, Cocks, Clifford, and Williamson, Malcolm (1975). PublicKey Cryptography. Classified reports (titles uncertain) at Government Communications Headquarters (GCHQ), Cheltenham, UK. Work declassified in 1997. Awarded the 100th IEEE Milestone Award for the first discovery (albeit long secret) of publickey cryptography. www.gchq.gov.uk/Press/Pages/100th-IEEE-milestone-award.aspx.Google Scholar
European Commission (March 11, 2020). “A New Circular Economy Action Plan.” ec.europa.eu/environment/circular-economy/.Google Scholar
European Commission, High Level Steering Committee, DG Connect (June 28, 2017a). “Quantum Technologies Flagship Final Report.” digital-strategy.ec.europa.eu/en/library/quantum-flagship-high-level-expert-group-publishes-final-report.Google Scholar
European Commission, High Level Steering Committee, DG Connect (2017b). “Quantum Technologies Flagship Intermediate Report.”Google Scholar
Fagaly, Robert (2014). “SQUID Magnetometers.” In: Measurement, Instrumentation, and Sensors Handbook, Second Edition: Electromagnetic, Optical, Radiation, Chemical, and Biomedical Measurement. Boca Raton, FL: CRC Press, pp. 114.Google Scholar
Faley, M. I. et al. (December 6, 2017). “Superconducting Quantum Interferometers for Nondestructive Evaluation.” Sensors 17.12, pp. 2798.Google Scholar
Farrell, Henry and Newman, Abraham L (2019). “Weaponized Interdependence: How Global Economic Networks Shape State Coercion.” International Security 44.1, pp. 4279.Google Scholar
Feynman, Richard P. (December 29, 1959). “There's Plenty of Room at The Bottom: An Invitation to Enter a New Field of Physics.” Lecture given at the American Physical Society. Published in Engineering and Science, February 1960, pp. 2236.Google Scholar
Feynman, Richard P. (1982). “Simulating Physics with Computers.” International Journal of Theoretical Physics 21.6, pp. 467488. doi.org/10.1007/BF02650179.Google Scholar
Feynman, Richard P. (February 1985a). “Quantum Mechanical Computers.” Optics News 11.2, pp. 1120.Google Scholar
Feynman, Richard P. (1985b). “Tiny Computers Obeying Quantum Mechanical Laws.” In: New Directions in Physics: The Los Alamos 40th Anniversary Volume. Boston, MA: Academic Press.Google Scholar
Feynman, Richard P. (1986). Foundations of Physics 16.6, pp. 507531.Google Scholar
Finke, Doug (2021). “Qubit Count.” Quantum Computing Report. quantumcomputingreport.com/scorecards/qubit-count/.Google Scholar
Flamini, Fulvio, Spagnolo, Nicolo, and Sciarrino, Fabio (2018). “Photonic Quantum Information Processing: a Review.” Reports on Progress in Physics 82.1, pp. 016001.Google Scholar
Fortt, Jon (March 11, 2010). “Top 5 Moments From Eric Schmidt's Talk in Abu Dhabi.” Fortune.Google Scholar
Fowler, Austin G. et al. (September 2012). “Surface Codes: Towards Practical Large-Scale Quantum Computation.” Physical Review A 86.3. dx.doi.org/10.1103/PhysRevA.86.032324.Google Scholar
Frank, M. P. (2002). “The Physical Limits of Computing.” Computing in Science Engineering 4.3, pp. 1626.CrossRefGoogle Scholar
Fredkin, Ed, Landauer, Rolf, and Toffoli, Tom (1982). “Physics of Computation.” International Journal of Theoretical Physics 21 (12), pp. 903903. doi.org/10.1007/BF02084157.Google Scholar
Fredkin, Edward F. (July 5, 2006). “Oral History of Ed Fredkin.” Interviewed by Gardner Hendrie. archive.computerhistory.org/resources/access/text/2013/05/102630504-05-01-acc.pdf.Google Scholar
Fredkin, Edward F. and Toffoli, Tommaso (April 1982). “Conservative Logic.” International Journal of Theoretical Physics 21.3–4, pp. 219253.Google Scholar
Fredkin, Edward F. and Toffoli, Tommaso (2001). “Design Principles for Achieving High-Performance Submicron Digital Technologies.” In: Collision-Based Computing. Berlin, Heidelberg: Springer-Verlag, pp. 2746.Google Scholar
Fujiwara, Masazumi et al. (2020). “Real-Time Nanodiamond Thermometry Probing in Vivo Thermogenic Responses.” Science Advances 6.37.Google Scholar
Gaithersburg, MD: National Institute of Standards and Technology (2018). “NIST Jump-Starts Quantum Information.” www.nist.gov/topics/physics/introduction-new-quantum-revolution/nist-jumpstarts-quantum-information.Google Scholar
Gaithersburg, MD: National Institute of Standards and Technology (June 5, 2019). “Second: The Future.” www.nist.gov/si-redefinition/second/second-future.Google Scholar
Gamberini, Sarah Jacobs and Rubin, Lawrence (2021). “Quantum Sensing's Potential Impacts on Strategic Deterrence and Modern Warfare.” Orbis. www.sciencedirect.com/science/article/pii/S0030438721000120.Google Scholar
Gardner, Martin (October 1970). “The Fantastic Combinations of John Conway's New Solitaire Game ‘Life’.” Scientific American 223, pp. 120123.Google Scholar
Gardner, Martin (August 1977). “Mathematical Games: A New Kind of Cipher That Would Take Millions of Years to Break.” Scientific American 237.2, pp. 120124. www.nature.com/scientificamerican/journal/v237/n2/pdf/scientificamerican0877-120.pdf.Google Scholar
Garfinkel, Simson L. (1994). PGP: Pretty Good Privacy. Sebastapol, CA: O’Reilly & Associates.Google Scholar
Garfinkel, Simson L. (October 11, 1995). “1985–1995: Digital Decade. MIT's Computing Think Tank Chronicles The Electronic Age.” San Jose Mercury News. simson.net/clips/1995/95.SJMN.MediaLab.pdf.Google Scholar
Garfinkel, Simson L. (2000). Database Nation: The Death of Privacy in The 21st Century. Seabastopol, CA: O’Reilly.Google Scholar
Garfinkel, Simson L. (May 2005). “Quantum Physics to The Rescue: Cryptographic Systems Can Be Cracked. And People Make Mistakes. Take Those Two Factors out of The Equation, and You Have Quantum Cryptography and a New Way to Protect Your Data.” CSO Magazine.Google Scholar
Garfinkel(aut.), Simson L. and Abelson, Hal (ed.) (1999). Architects of The Information Society. Cambridge, MA: MIT Press.Google Scholar
Garfinkel, Simson L. and Grunspan, Rachel H. (2018). The Computer Book. New York, NY: Sterling Milestones.Google Scholar
Garfinkel, Simson L. and Leclerc, Philip (2020). “Randomness Concerns When Deploying Differential Privacy.” Proceedings of The 19th Workshop on Privacy in The Electronic Society. WPES’20. New York: Association for Computing Machinery, pp. 7386. doi.org/10.1145/3411497.3420211.Google Scholar
Garroway, A. N. et al. (2001). “Remote Sensing by Nuclear Quadrupole Resonance.” IEEE Transactions on Geoscience and Remote Sensing 39.6, pp. 11081118.Google Scholar
Gellman, Barton (2020). Dark Mirror: Edward Snowden and The American Surveillance State. London: The Bodley Head.Google Scholar
Gely, Mario F. et al. (2019). “Observation and Stabilization of Photonic Fock States in a Hot Radio-Frequency Resonator.” Science 363.6431, pp. 10721075. science.sciencemag.org/content/363/6431/1072.Google Scholar
Gerlich, Stefan et al. (2011). “Quantum Interference of Large Organic Molecules.” Nature Communications 2.1, pp. 15.Google Scholar
Gershenfeld, Neil A. and Chuang, Isaac L. (1997). “Bulk Spin-Resonance Quantum Computation.” Science 275.5298, pp. 350356. science.sciencemag.org/content/275/5298/350.Google Scholar
Gibney, Elizabeth (2017). “New Definitions of Scientific Units Are on The Horizon.” Nature 550.7676, pp. 312313.Google Scholar
Gibney, Elizabeth (2019). “The Quantum Gold Rush.” Nature 574.7776, pp. 2224.Google Scholar
Gidney, Craig and Ekerå, Martin (2019). “How to Factor 2048 Bit RSA Integers in 8 Hours Using 20 Million Noisy Qubits.” arxiv.org/abs/1905.09749.Google Scholar
Giurgica-Tiron, Tudor et al. (2020). “Low Depth Algorithms for Quantum Amplitude Estimation.” arxiv.org/abs/2012.03348.Google Scholar
Goldberg, Ian, Wagner, David, and Brewer, Eric (1997). “Privacy-Enhancing Technologies for The Internet.” Proceedings IEEE COMPCON 97. Digest of Papers. IEEE. San Jose, CA, pp. 103109.Google Scholar
Goodin, Dan (December 3, 2019). “New Crypto-Cracking Record Reached, with Less Help Than Usual From Moore's Law.” Ars Technica. arstechnica.com/information-technology/2019/12/new-crypto-cracking-record-reached-with-less-help-than-usual-from-moores-law/.Google Scholar
Google (n.d.). “Quantum –Google AI” (). ai.google/research/teams/applied-science/quantum-ai/.Google Scholar
Google LLC (2021). “Encryption at Rest.” Last accessed January 1, 2021. cloud.google.com/security/encryption-at-rest.Google Scholar
Goucher, Adam P. (2012). “Antikythera Mechanism.” demonstrations.wolfram.com/AntikytheraMechanism/.Google Scholar
“GPS Navigation: From the Gulf War to Civvy Street” (November 2, 2018). www.sciencemuseum.org.uk/objects-and-stories/gps-navigation-gulf-war-civvy-street.Google Scholar
Grant, Edward (2008). Much Ado About Nothing: Theories of Space and Vacuum From The Middle Ages to The Scientific Revolution. Cambridge: Cambridge University Press.Google Scholar
Greenspan, Donald (1982). “Deterministic Computer Physics.” International Journal of Theoretical Physics 21.6, pp. 505523.Google Scholar
Greve, Frank (April 18, 1993). “Boeing Called A Target Of French Spy Effort.” The Seattle Times. archive.seattletimes.com/archive/?date=19930418&slug=1696416.Google Scholar
Grier, David Alan (2007). When Computers Were Human. Princeton, NJ: Princeton University Press.Google Scholar
Grumbling, Emily and Horowitz, Mark (2019). Quantum Computing: Progress and Prospects. Washington, DC: National Academies Press. doi.org/10.17226/25196.Google Scholar
Guha, S. and Erkmen, B. (2009). “Gaussian-State Quantum-Illumination Receivers for Target Detection.” Physical Review A 80, pp. 052310.Google Scholar
Gunning, D. and Aha, D. W. (2019). “DARPA's Explainable Artificial Intelligence Program.” AI Magazine 40.2, pp. 4458.Google Scholar
Gurobi Optimization, LLC (2019). “Air France Tail Assignment Optimization.” www.gurobi.com/wp-content/uploads/2019/09/Air-France-Case-Study.pdf.Google Scholar
Gwinner, Jan et al. (2020). “Benchmarking 16-Element Quantum Search Algorithms on IBM Quantum Processors.” arxiv.org/abs/2007.06539.Google Scholar
Hagestad, William T. (2012). “Chinese IW Capabilities.” In: 21st Century Chinese Cyberwarfare. Cambridgeshire, UK: IT Governance Publishing, pp. 137146. www.jstor.org/stable/j.ctt5hh5nz.16.Google Scholar
Halder, Matthäus et al. (2007). “Entangling Independent Photons by Time Measurement.” Nature Physics 3.10, pp. 692695. doi.org/10.1038/nphys700.Google Scholar
Hambling, David (2017). “China's Quantum Submarine Detector Could Seal South China Sea.” New Scientist 22.Google Scholar
Harari, Y. N. (2017). Homo Deus: A Brief History of Tomorrow. New York: Harper Collins.Google Scholar
Hardesty, Jasper (2014). “Safety, Security and Dual-Use Chemicals.” Journal of Chemical Health and Safety 22.5, pp. 316.Google Scholar
Harris, Mark (October 4, 2018). “D-Wave Launches Free Quantum Cloud Service.” IEEE Spectrum. spectrum.ieee.org/dwave-launches-free-quantum-cloud-service.Google Scholar
Harris, Robert G. and Carman, James M. (1984). “Public Regulation of Marketing Activity: Part II: Regulatory Responses to Market Failures.” Journal of Macromarketing 4.1, pp. 4152. doi.org/10.1177/027614678400400105.Google Scholar
al-Haytham, Ibn (1011). Book of Optics.Google Scholar
Heidari, Hadi and Nabaei, Vahid (2019). “SQUID Sensors.” In: Magnetic Sensors for Biomedical Applications. New York: John Wiley and Sons, pp. 163212.Google Scholar
Heisenberg, Werner (March 1927). “Über Den Anschaulichen Inhalt Der Quantentheoretischen Kinematik Und Mechanik.” Zeitschrift Für Physik 43.3, pp. 172198. doi.org/10.1007/BF01397280.Google Scholar
Heisenberg, Werner (1983). Encounters with Einstein. Princeton, NJ: Princeton University Press.Google Scholar
Heller, Nathan (December 18, 2017). “The Digital Republic: Is Estonia The Answer to The Crisis of Nation-States?” New Yorker, pp. 8493.Google Scholar
Heuer, Richards J. Jr. and Pherson, Randolph H. (2015). Structured Analytic Techniques for Intelligence Analysis. 2nd ed. Thousand Oaks, California: CQ Press.Google Scholar
Hill, Kashmir (July 24, 2013). “Blueprints of NSA's Ridiculously Expensive Data Center in Utah Suggest It Holds Less Info Than Thought.” Forbes. www.forbes.com/sites/kashmirhill/2013/07/24/blueprints-of-nsa-data-center-in-utah-suggest-its-storage-capacity-is-less-impressive-than-thought.Google Scholar
Hill, Kashmir (2021). “Your Face Is Not Your Own.” New York Times Magazine. www.nytimes.com/interactive/2021/03/18/magazine/facial-recognition-clearview-ai.html.Google Scholar
Hillis, W. Daniel (1982). “New Computer Architectures and Their Relationship to Physics or Why Computer Science Is No Good.” International Journal of Theoretical Physics 21.3, pp. 255262.Google Scholar
Hillis, W. Daniel (1989). “Richard Feynman and The Connection Machine.” Physics Today 42.2. physicstoday.scitation.org/doi/10.1063/1.881196.Google Scholar
Hillis, Daniel and Silverman, Brian (1978). “Original Tinkertoy Computer.” Computer History Museum. www.computerhistory.org/collections/catalog/X39.81.Google Scholar
Hlembotskyi, Vladyslav et al. (2020). “Efficient Unstructured Search Implementation on Current Ion-Trap Quantum Processors.” arxiv.org/abs/2010.03841.Google Scholar
Ho, Chi-Tang, Zheng, Xin, and Lib, Shiming (March 2015). “Tea Aroma Formation.” Food Science and Human Wellness, pp. 927. www.sciencedirect.com/science/article/pii/S221345301500018X.Google Scholar
Hoffman, David (2009). The Dead Hand: The Untold Story of The Cold War Arms Race and Its Dangerous Legacy. New York: Anchor.Google Scholar
Holland, J., Smith, J. M., and Schuchard, M. (2019). “Measuring Irregular Geographic Exposure on The Internet.” ArXiv.Google Scholar
Hollingham, Richard (September 7, 2014). “V2: The Nazi Rocket That Launched The Space Age.” BBC. www.bbc.com/future/article/20140905-the-nazis-space-age-rocket.Google Scholar
Holtmaat, Anthony et al. (2009). “Long-Term, High-Resolution Imaging in The Mouse Neocortex through a Chronic Cranial Window.” Nature Protocols 4.8, pp. 11281144.Google Scholar
Homer (2018). The Odyssey, ed. Wilson, Emily R.. New York: W.W. Norton and Company.Google Scholar
Honeywell (June 2020). “The World's Highest Performing Quantum Computer Is Here.” www.honeywell.com/us/en/news/2020/06/the-worlds-highest-performing-quantum-computer-is-here.Google Scholar
Hoofnagle, Chris Jay (2016). Federal Trade Commission Privacy Law and Policy. New York: Cambridge University Press. assets.cambridge.org/97811071/26787/cover/9781107126787.jpg.Google Scholar
Hoogstraaten, Hans et al. (August 2012). Black Tulip Report of The Investigation into The DigiNotar Certificate Authority Breach. Tech. rep. PR-110202, pp. 101. www.researchgate.net/publication/269333601_Black_Tulip_Report_of_the_investigation_into_the_DigiNotar_Certificate_Authority_breach.Google Scholar
Horváth, Gábor (September 7, 2003). “Polarization Patterns in Nature: Imaging Polarimetry with Atmospheric Optical and Biological Applications.” DSc. Thesis. Budapest: Loránd Eötvös University.Google Scholar
House, Don Robert (2001). “A Synopsis of Teletype Corporation History.” simson.net/ref/2001/house-teletype-corp-synopsis.pdf.Google Scholar
House, Tamzy J. et al. (1996). Weather As a Force Multiplier: Owning The Weather in 2025. Tech. rep. Montgomery, AL: Air War College, Maxwell Air Force Base.Google Scholar
Housley, R. (July 2003). Use of The RSAES-OAEP Key Transport Algorithm in Cryptographic Message Syntax (CMS). RFC 3560 (Proposed Standard). Internet Engineering Task Force. www.ietf.org/rfc/rfc3560.txt.Google Scholar
Hughes, Richard J. et al. (2013). “Network-Centric Quantum Communications with Application to Critical Infrastructure Protection.” arxiv.org/abs/1305.0305.Google Scholar
Hull, Isaiah et al. (December 2020). “Quantum Technology for Economists.” Sveriges Riksbank Working Paper Series.Google Scholar
Huygen, Christiaan (1690). Traité de la Lumière. (Treatise on Light). The Hague, Netherlands: chez Pierre Vander Aa marchand libraire. archive.org/details/bub_gb_kVxsaYdZaaoC/page/n4.Google Scholar
Hwang, J. Y., Chang, J. B., and Chang, W. P. (2001). “Spread of 60Co Contaminated Steel and Its Legal Consequences in Taiwan.” Health Phys 81.6, pp. 65560.Google Scholar
Independent Working Group on Missile Defense (2009). Missile Defense, The Space Relationship, and The Twenty-First Century: 2009 Report. Published for the Independent Working Group by the Institute for Foreign Policy Analysis. www.ifpa.org/pdf/IWG2009.pdf.Google Scholar
Information Technology Laboratory (September 2013). Supplemental ITL Bulletin for September 2013. csrc.nist.gov/csrc/media/publications/shared/documents/itl-bulletin/itlbul2013-09-supplemental.pdf.Google Scholar
International Trade Administration (2021). “US Export Controls.” Last accessed March 6, 2021. www.trade.gov/us-export-controls.Google Scholar
Jaques, Samuel et al. (2019). “Implementing Grover Oracles for Quantum Key Search on AES and LowMC.” Report 2019/1146. eprint.iacr.org/2019/1146.Google Scholar
Jenks, W. G., Sadeghi, S. S. H., and Wilkswo, J. P. Jr. (1997). “Review Article: SQUIDs for Nondestructive Evaluation.” Journal of Physics D: Applied Physics 30, pp. 293323. citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.5200.Google Scholar
Jernigan, Carter and Mistree, Behram F. T. (September 22, 2009). “Gaydar: Facebook Friendships Expose Sexual Orientation.” First Monday. firstmonday.org/article/view/2611/2302.Google Scholar
Joint Chiefs of Staff (2020). DOD Dictionary of Military and Associated Terms. fas.org/irp/doddir/dod/jp1_02.pdf.Google Scholar
Jones, Sam (May 2014). “MoD's ‘quantum Compass’ Offers Potential to Replace GPS.” Financial Times.Google Scholar
Jordan, Stephen P. (May 2008). “Quantum Computation beyond The Circuit Model.” PhD thesis. Massachusetts Institute of Technology, Cambridge, MA. arxiv.org/pdf/0809.2307.pdf.Google Scholar
Jordan, Stephen P. (February 1, 2021). “Quantum Algorithm Zoo.” Last accessed February 15, 2021. quantumalgorithmzoo.org.Google Scholar
Joy, Bill (April 2000). “Why The Future Doesn't Need Us.” Wired. www.wired.com/2000/04/joy-2/.Google Scholar
Juma, Calestous (2016). Innovation and Its Enemies: Why People Resist New Technologies. New York: Oxford University Press.Google Scholar
Han, Jun et al. (2012). “ACComplice: Location Inference Using Accelerometers on Smartphones.” 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), pp. 19.Google Scholar
Jurcevic, Petar et al. (2020). “Demonstration of Quantum Volume 64 on a Superconducting Quantum Computing System.” arxiv.org/abs/2008.08571.Google Scholar
Juzeliunas, E., Ma, Y. P., and Wikswo, J. P. (2004). “Remote Sensing of Aluminum Alloy Corrosion by SQUID Magnetometry.” Journal of Solid State Electrochemistry 8, pp. 435441.Google Scholar
Kadrich, Mark (2007). Endpoint Security. Boston, MA: Addison-Wesley Professional.Google Scholar
Kahn, David (1996). The Codebreakers: The Comprehensive History of Secret Communication From Ancient Times to The Internet. New York: Scribner.Google Scholar
Kan, Shirley (April 2007). China's Anti-Satellite Weapon Test. New York: Congressional Research Service. fas.org/sgp/crs/row/RS22652.pdf.Google Scholar
Kania, Elsa B. and Costello, John (2018). Quantum Hegemony? China's Ambitions and The Challenge to US Innovation Leadership. Washington, DC: Center for a New American Security.Google Scholar
Katyal, Sonia (September 14, 2017). “Why You Should Be Suspicious of That Study Claiming A.I. Can Detect a Person's Sexual Orientation.” Slate.Google Scholar
Keats, Jonathon (September 27, 2011). “The Search for a More Perfect Kilogram.” Wired. www.wired.com/2011/09/ff-kilogram/.Google Scholar
Kerr, Orin S. (2001). “The Fourth Amendment in Cyberspace: Can Encryption Create a Reasonable Expectation of Privacy?Connecticut Law Review 33.2, pp. 503534.Google Scholar
Kerr, Orin S. (2015). “The Fourth Amendment and The Global Internet.” Stan. L. Rev. 67, pp. 285.Google Scholar
Khan, I. et al. (2018). “Satellite-Based QKD.” Optics and Photonics News 29.2, pp. 2633.Google Scholar
Kim, Donggyu et al. (2019). “A CMOS-Integrated Quantum Sensor Based on Nitrogen–vacancy Centres.” Nature Electronics 2.7, pp. 284289. doi.org/10.1038/s41928-019-0275-5.Google Scholar
King, Gilbert (June 6, 2012). “Fritz Haber's Experiments in Life and Death.” Smithsonian Magazine. www.smithsonianmag.com/history/fritz-habers-experiments-in-life-and-death-114161301/.Google Scholar
Knuth, Donald E. (December 1970). “Von Neumann's First Computer Program.” ACM Computing Survey 2.4, pp. 247260. dl.acm.org/doi/10.1145/356580.356581.Google Scholar
Koblitz, Neal (January 1987). “Elliptic Curve Cryptosystems.” Mathematics of Computation 48.177, pp. 203209.Google Scholar
Koblitz, N. and Menezes, A. (2016). “A Riddle Wrapped in an Enigma.” IEEE Security Privacy 14.6, pp. 3442.Google Scholar
Koh, John S., Bellovin, Steven M., and Nieh, Jason (2019). “Why Joanie Can Encrypt: Easy Email Encryption with Easy Key Management.” Proceedings of The Fourteenth EuroSys Conference 2019. Dresden: Association for Computing Machinery. doi.org/10.1145/3302424.3303980.Google Scholar
Kohnfelder, Loren M. (1978). “Towards a Practical Public-Key Cryptosystem.” Undergraduate thesis, Massachusetts Institute of Technology, Cambridge, MA. dspace.mit.edu/handle/1721.1/15993.Google Scholar
Koller, Josef S. (2019). The Future of Ubiquitous, Realtime Intelligence: A GEOINT Singularity. Arlington, Virginia: Center for Space Policy and Strategy.Google Scholar
Koops, E. J. et al. (2006). “Should ICT Regulation Be Technology-Neutral?” In: Starting Points for ICT Regulation. The Hague, Netherlands: TMC Asser Press, pp. 77108.Google Scholar
Korzeczek, Martin C. and Braun, Daniel (2020). “Quantum-Router: Storing and Redirecting Light at The Photon Level.” arxiv.org/abs/2003.03363.Google Scholar
Kuo, Lucas and Arterburn, Jason (2009). Lux and Loaded: Exposing North Korea's Strategic Procurement Networks. Washington, DC. www.c4reports.org/lux-and-loaded.Google Scholar
Kwak, Sean (October 7, 2017). “The Coming Quantum Revolution: Security and Policy Implications, Hudson Institute.” www.hudson.org/events/1465-the-coming-quantum-revolution-security-and-policy-implications102017.Google Scholar
Kwiatkowski, Kris (June 20, 2019). “Towards Post-Quantum Cryptography in TLS.” The Cloudflare Blog. blog.cloudflare.com/towards-post-quantum-cryptography-in-tls/.Google Scholar
Landauer, R. (1961). “Irreversibility and Heat Generation in The Computing Process.” IBM Journal of Research and Development 5.3, pp. 183191.Google Scholar
Landauer, Rolf (1982). “Physics and Computation.” International Journal of Theoretical Physics 21.3, pp. 283297.Google Scholar
Langenberg, Brandon, Pham, Hai, and Steinwandt, Rainer (2019). “Reducing The Cost of Implementing AES As a Quantum Circuit.” Report 2019/854. eprint.iacr.org/2019/854.Google Scholar
Langley, Adam (November 22, 2011). “Protecting Data for The Long Term with Forward Secrecy.” Google Security Blog. security.googleblog.com/2011/11/protecting-data-for-long-term-with.html.Google Scholar
Lanzagorta, Marco (2011). Quantum Radar. Synthesis Lectures on Quantum Computing. Morgan & Claypool.Google Scholar
Lanzagorta, Marco (2013). Underwater Communications. Williston, VT: Morgan & Claypool.Google Scholar
Lanzagorta, Marco (August 2018). “Envisioning The Future of Quantum Sensing and Communications.” Remarks of Marco Lanzagorta at the Conference on Quantum Sensing and Communications held by the National Academies of Sciences, Engineering and Medicine.Google Scholar
Lanzagorta, Marco and Uhlmann, Jeffrey (2015). “Space-Based Quantum Sensing for Low-Power Detection of Small Targets.” 9461, pp. 946115.Google Scholar
Lanzagorta, Marco and Uhlmann, Jeffrey (2020). “Opportunities and Challenges of Quantum Radar.” IEEE Aerospace and Electronic Systems Magazine 35.11, pp. 3856.Google Scholar
Lanzagorta, Marco, Uhlmann, Jeffrey, and Venegas-Andraca, Salvador E. (2015). “Quantum Sensing in The Maritime Environment.” OCEANS 2015 –MTS/IEEE Washington, pp. 19.Google Scholar
Lerman, Amy E. (June 2019). Good Enough for Government Work: The Public Reputation Crisis in America (And What We Can Do to Fix It). University of Chicago Press.Google Scholar
Levy, Steven (April 1, 1999). “The Open Secret.” Wired. www.wired.com/1999/04/crypto/.Google Scholar
Lewis, Gilbert N (1926). “The Conservation of Photons.” Nature 118.2981, pp. 874875.Google Scholar
Li, Meixiu et al. (2019). “Review of Carbon and Graphene Quantum Dots for Sensing.” ACS Sensors 4.7, pp. 17321748.Google Scholar
Li, T. et al. (2016). “Security Attack Analysis Using Attack Patterns.” 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS). Grenoble, France, pp. 113.Google Scholar
Liao, Sheng-Kai et al. (2018). “Satellite-Relayed Intercontinental Quantum Network.” Physical Review Letters 120.3, pp. 030501.Google Scholar
Lloyd, Seth (2014). “The Computational Universe.” In: Information and The Nature of Reality: From Physics to Metaphysics. Cambridge University Press, pp. 118133.Google Scholar
Loriani, S. et al. (June 2019). “Atomic Source Selection in Space-Borne Gravitational Wave Detection.” New Journal of Physics 21.6, pp. 063030. iopscience.iop.org/article/10.1088/1367-2630/ab22d0.Google Scholar
Loss, Daniel and DiVincenzo, David P. (1998). “Quantum Computation with Quantum Dots.” Physical Review A 57.1, pp. 120126.Google Scholar
Ma, Lijun et al. (September 1, 2015). “EIT Quantum Memory with Cs Atomic Vapor for Quantum Communication.” Proceedings of SPIE Optics and Photonics 2015. www.nist.gov/publications/eit-quantum-memory-cs-atomic-vapor-quantum-communication.Google Scholar
Ma, Xiongfeng et al. (2016). “Quantum Random Number Generation.” Npj Quantum Information 2.1.Google Scholar
Majorana, Ettore and Maiani, Luciano (2006). “A Symmetric Theory of Electrons and Positrons.” In: Ettore Majorana Scientific Papers. Berlin: Springer, pp. 201233.Google Scholar
Mallapaty, Smriti (2020). “China Bans Cash Rewards for Publishing Papers.” Nature 579.7798, pp. 1819.Google Scholar
Manglaviti, Ariana (June 5, 2018). “Exploring Greener Approaches to Nitrogen Fixation.” www.bnl.gov/newsroom/news.php?a=212919.Google Scholar
Manin, Yuri I. (May 1999). “Classical Computing, Quantum Computing, and Shor's Factoring Algorithm.” Talk at the Bourbaki Seminar, June 1999, later published in Astréisque 266 (2000), exp. no. 862, p. 375404. arxiv.org/pdf/quant-ph/9903008.pdf.Google Scholar
Manin, Yuri I. (2007). Mathematics As Metaphor: Selected Essays of Yuri I. Manin. Providence, RI: American Mathematical Society.Google Scholar
Marcus, Amy Dockser (May 8, 2020). “Covid-19 Raises Questions About The Value of Personalized Medicine.” Wall Street Journal–Online Edition.Google Scholar
Marks, Paul (October 15, 2007). “Quantum Cryptography to Protect Swiss Election.” New Scientist. www.newscientist.com/article/dn12786-quantum-cryptography-to-protect-swiss-election/.Google Scholar
Matzke, Doug (1993). “Message From The Chairman.” In: Workshop on Physics and Computation PhysComp ‘92. Dallas, TX: IEEE Computer Society Press.Google Scholar
Mazzucato, Mariana (2015). The Entrepreneurial State: Debunking Public Vs. Private Sector Myths. New York: PublicAffairs.Google Scholar
McCarthy, J. et al. (1955). “A Proposal for The Dartmouth Summer Research Project on Artificial Intelligence.” Last accessed August 23, 2020. www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html.Google Scholar
McDermott, Roger N. (September 2017). Russia's Electronic Warfare Capabilities to 2025. International Centre for Defence. euagenda.eu/upload/publications/untitled-135826-ea.pdf.Google Scholar
McGrew, W. F. et al. (2018). “Atomic Clock Performance Enabling Geodesy Below The Centimetre Level.” Nature 564.7734, pp. 8790. doi.org/10.1038/s41586-018-0738-2.Google Scholar
Merkle, Ralph Charles (June 1979). Secrecy, Authentication and Public Key Systems. Tech. rep. 1979-1. Information Systems Laboratory, Stanford University. www.merkle.com/papers/Thesis1979.pdf.Google Scholar
Merriam-Webster Incorporated (2020). ““Machine.”” www.merriam-webster.com/dictionary/machine.Google Scholar
Metropolis, N. (1987). “The Beginning of The Monte Carlo Method.” Los Alamos Science 15.Google Scholar
Meyer, David H. et al. (2020). “Assessment of Rydberg Atoms for Wideband Electric Field Sensing.” Journal of Physics B: Atomic, Molecular and Optical Physics 53.3, pp. 034001.Google Scholar
Meyers, Ronald E. and Deacon, Keith S. (2015). “Space-Time Quantum Imaging.” Entropy 17.3, pp. 15081534.Google Scholar
Meyers, Ronald E., Deacon, Keith S., and Shih, Yanhua (April 2008). “Ghost-Imaging Experiment by Measuring Reflected Photons.” Physical Review A 77.4, pp. 041801. link.aps.org/doi/10.1103/PhysRevA.77.041801.Google Scholar
Microsoft Corp. (2013). “Microsoft Security Advisory 2862973: Update for Deprecation of MD5 Hashing Algorithm for Microsoft Root Certificate Program.” docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2014/2862973.Google Scholar
Microsoft Corp. (2018). “Developing a Topological Qubit.” cloudblogs.microsoft.com/quantum/2018/09/06/developing-a-topological-qubit/.Google Scholar
Miller, Victor S. (1986). “Use of Elliptic Curves in Cryptography.” Advances in Cryptology –CRYPTO ‘85 Proceedings, ed. Williams, Hugh C.. Berlin, Heidelberg: Springer, pp. 417426.Google Scholar
Minsky, Marvin (1982). “Cellular Vacuum.” International Journal of Theoretical Physics 21.6, pp. 537551.Google Scholar
Mirhosseini, M. et al. (2015). “High-Dimensional Quantum Cryptography with Twisted Light.” New Journal of Physics 17, pp. 112.Google Scholar
MIT (May 29, 2018). “Outside Professional Activities.” In: MIT Policies. Last accessed March 6, 2021. Chap. 4.5. policies.mit.edu/policies-procedures/40-faculty-rights-and-responsibilities/45-outside-professional-activities.Google Scholar
MIT Endicott House (2020). “Our History.” Last accessed September 28, 2020. mitendicotthouse.org/our-history/.Google Scholar
MIT Institute Archives (2011). “Laboratory for Computer Science (LCS).” Last accessed August 2, 2020. libraries.mit.edu/mithistory/research/labs/lcs.Google Scholar
Mohseni, M. et al. (2017). “Commercialize Quantum Technologies in Five Years.” Nature 543.7644, pp. 171174.Google Scholar
Moller, Violet (May 10, 2019). “How Anti-Immigrant Policies Thwart Scientific Discovery.” Washington Post.Google Scholar
Möller, Matthias and Vuik, Cornelis (2017). “On The Impact of Quantum Computing Technology on Future Developments in High-Performance Scientific Computing.” Ethics and Information Technology 19.4, pp. 253269.Google Scholar
Molteni, Megan (September 14, 2017). “With Designer Bacteria, Crops Could One Day Fertilize Themselves.” Wired. www.wired.com/story/with-designer-bacteria-crops-could-one-day-fertilize-themselves/.Google Scholar
Monroe, C. et al. (December 1995). “Demonstration of a Fundamental Quantum Logic Gate.” Physical Review Letters 75.25, pp. 47144717. link.aps.org/doi/10.1103/PhysRevLett.75.4714.Google Scholar
Monroe, Christopher, Raymer, Michael G., and Taylor, Jacob (2019). “The US National Quantum Initiative: From Act to Action.” Science 364.6439, pp. 440442. science.sciencemag.org/content/364/6439/440.Google Scholar
Montanaro, Ashley (January 2016). “Quantum Algorithms: an Overview.” Npj Quantum Information 2.1. dx.doi.org/10.1038/npjqi.2015.23.Google Scholar
Moore, Gordon E. (1965). “Cramming More Components Onto Integrated Circuits.” Electronics Magazine 38 (8), pp. 8285. www.computerhistory.org/collections/catalog/102770822.Google Scholar
Moore, Gordon E. (September 2006). “Progress in Digital Integrated Electronics [Technical Literature, Copyright 1975 IEEE. Reprinted, with Permission. Technical Digest. International Electron Devices Meeting, IEEE, 1975, pp. 11–13.]IEEE Solid-State Circuits Society Newsletter 11.3, pp. 3637. ieeexplore.ieee.org/document/4804410/.Google Scholar
Morozov, Evgeny (October 13, 2014). “The Planning Machine: Project Cybersyn and The Origins of The Big Data Nation.” New Yorker 90.31.Google Scholar
Morser, Bruce (2020). “Inertial Navigation.” Last accessed October 24, 2020. www.panam.org/the-jet-age/517-inertial-navigation-2.Google Scholar
Mourik, Vincent et al. (May 25, 2012). “Signatures of Majorana Fermions in Hybrid Superconductor-Semiconductor Nanowire Devices.” Science 336.6084, pp. 10031007.Google Scholar
Murph, Paul (December 11, 2019). “Wirecard Critics Targeted in London Spy Operation.” Financial Times. www.ft.com/content/d94c938e-1a84-11ea-97df-cc63de1d73f4.Google Scholar
Musiani, Francesca et al. (2016). The Turn to Infrastructure in Internet Governance. Berlin: Springer.Google Scholar
Nash, Gerald D. (1999). The Federal Landscape: an Economic History of The Twentieth-Century West. Tucson: University of Arizona Press. www.h-net.org/review/hrev-a0b4n6-aa.Google Scholar
National Center for Science and Engineering Statistics (December 2019). Doctorate Recipients From US Universities. Tech. rep. NSF 21-308. Washington, DC: Directorate for Social, Behavioral and Economic Sciences, National Science Foundation. ncses.nsf.gov/pubs/nsf21308.Google Scholar
National Coordination Office for Space-Based Positioning, Navigation, and Timing (October 2001). “Frequently Asked Questions About Selective Availability.” GPS.gov. www.gps.gov/systems/gps/modernization/sa/faq/.Google Scholar
National Institute of Standards and Technology (January 3, 2017). “Post-Quantum Cryptography.” Last accessed February 9, 2021. csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/Call-for-Proposals.Google Scholar
National Security Agency (January 6, 2001). “Groundbreaking Ceremony Held for 1.2 Billion Utah Data Center.” Press Release Pa-118-18. www.nsa.gov/news-features/press-room/Article/1630552/groundbreaking-ceremony-held-for-12-billion-utah-data-center/.Google Scholar
National Security Agency (2020). “Quantum Key Distribution (QKD) and Quantum Cryptography (QC).” Last accessed July 25, 2021. www.nsa.gov/what-we-do/cybersecurity/quantum-key-distribution-qkd-and-quantum-cryptography-qc/.Google Scholar
National Security Agency and Central Security Service (2016). “Commercial National Security Algorithm Suite and Quantum Computing FAQ.” apps.nsa.gov/iaarchive/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/cnsa-suite-and-quantum-computing-faq.cfm.Google Scholar
National Security Agency and Central Security Service (2021). “VENONA.” Last accessed March 13, 2021. www.nsa.gov/News-Features/Declassified-Documents/Venona/.Google Scholar
Nicholson, T. L. et al. (2015). “Systematic Evaluation of an Atomic Clock at 2 × 10−18 Total Uncertainty.” Nature Communications 6.1, pp. 6896. doi.org/10.1038/ncomms7896.Google Scholar
NobelPrize.org (October 2019). “The Nobel Prize in Physics 1965.” www.nobelprize.org/prizes/physics/1965/summary/.Google Scholar
Nuttall, William J., Clarke, Richard H., and Glowacki, Bartek A. (2012). “Stop Squandering Helium.” Nature 485.7400, pp. 573575.Google Scholar
O’Mara, Margaret Pugh (2015). Cities of Knowledge: Cold War Science and The Search for The Next Silicon Valley. Princeton, NJ: Princeton University Press.Google Scholar
O’Mara, Margaret Pugh (2019). The Code: Silicon Valley and The Remaking of America. New York: Penguin Press.Google Scholar
Obama, Barack (December 29, 2009). “Executive Order 13526: Classified National Security Information.” www.archives.gov/isoo/policy-documents/cnsi-eo.html.Google Scholar
Office of the Secretary of Defense (2020). “Department of Defense Fiscal Year (FY) 2021 Budget Estimates.” In: Defense-Wide Justification Book. Last accessed February 20, 2021. US Department of Defense. Chap. 3, pp. 1094. comptroller.defense.gov/Portals/45/Documents/defbudget/fy2021/budget_justification/pdfs/03_RDT_and_E/RDTE_Vol3_OSD_RDTE_PB21_Justification_Book.pdf.Google Scholar
Ohm, Paul (2009a). “Broken Promises of Privacy: Responding to The Surprising Failure of Anonymization.” UCLA L. Rev. 57, pp. 17011777.Google Scholar
Ohm, Paul (2009b). “The Rise and Fall of Invasive ISP Surveillance.” University of Illinois Law Review. ssrn.com/abstract_id=1261344.Google Scholar
Olson, Parmy (April 10, 2020). “My Girlfriend Is a Chatbot.” Wall Street Journal.Google Scholar
Omar, Yasser (May 6, 2015). “Workshop on Quantum Technologies and Industry.” DG Connect. digital-strategy.ec.europa.eu/en/library/report-workshop-quantum-technologies-and-industry.Google Scholar
Oqubay, Arkebe (2015). “Climbing without Ladders: Industrial Policy and Development.” In: Made in Africa. Oxford University Press.Google Scholar
Organized Crime and Corruption Reporting Project (March 20, 2017). “The Russian Laundromat Exposed.” www.occrp.org/en/laundromat/the-russian-laundromat-exposed/.Google Scholar
Ortega, Almudena Azcárate (January 28, 2021). “Placement of Weapons in Outer Space: The Dichotomy between Word and Deed.” Lawfare. www.lawfareblog.com/placement-weapons-outer-space-dichotomy-between-word-and-deed.Google Scholar
Padma, T. V. (2020). “India Bets Big on Quantum Technology.” Nature. www.nature.com/articles/d41586-020-00288-x/.Google Scholar
Palmer, J. (2017). “Technology Quarterly: Here, There and Everywhere.” The Economist 413.9027.Google Scholar
Pan, Feng and Zhang, Pan (2021). “Simulating The Sycamore Quantum Supremacy Circuits.” arxiv.org/abs/2103.03074.Google Scholar
Pant, Mihir et al. (March 2019). “Routing Entanglement in The Quantum Internet.” Npj Quantum Information 5.1, pp. 25. doi.org/10.1038/s41534-019-0139-x.Google Scholar
Patinformatics (2017). “Quantum Information Technology Patent Landscape Reports.”Google Scholar
Pawlyk, Oriana (June 10, 2020). “Air Force Will Pit a Drone Against a Fighter Jet in Aerial Combat Test.” www.military.com/daily-news/2020/06/10/air-force-will-pit-drone-against-fighter-jet-aerial-combat-test.html.Google Scholar
Pednault, Edwin et al. (October 12, 2019). “On ‘Quantum Supremacy’.” IBM Research Blog. www.ibm.com/blogs/research/2019/10/on-quantum-supremacy/.Google Scholar
Peng, Wang Chun et al. (2019). “Factoring Larger Integers with Fewer Qubits via Quantum Annealing with Optimized Parameters.” Science China Physics, Mechanics and Astronomy 62.6, pp. 60311. doi.org/10.1007/s11433-018-9307-1.Google Scholar
Peres, Asher (December 1985). “Reversible Logic and Quantum Computers.” Physical Review A 32 (6), pp. 32663276. link.aps.org/doi/10.1103/PhysRevA.32.3266.Google Scholar
Perlroth, Nicole (September 10, 2013). “Government Announces Steps to Restore Confidence on Encryption Standards.” The New York Times. bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/.Google Scholar
Perlroth, Nicole (2021). This Is How They Tell Me The World Ends: The Cyber-weapons Arms Race. New York: Bloomsbury Publishing.Google Scholar
Perrin, Léo (2019). “Partitions in The S-Box of Streebog and Kuznyechik.” Report 2019/092. eprint.iacr.org/2019/092.Google Scholar
Peterson, Scott and Faramarzi, Payam (December 15, 2011). “Exclusive: Iran Hijacked US Drone, Says Iranian Engineer.” Christian Science Monitor. www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer.Google Scholar
Pfaff, W. et al. (2014). “Unconditional Quantum Teleportation between Distant Solid-State Quantum Bits.” Science 345.6196, pp. 532535.Google Scholar
Physics Today (February 4, 2019). “Rolf Landauer.” Physics Today. physicstoday.scitation.org/do/10.1063/PT.6.6.20190204a/full/.Google Scholar
Pirandola, S. et al. (2018). “Advances in Photonic Quantum Sensing.” Nature Photonics 12.12, pp. 724733.Google Scholar
Pisana, Simone et al. (March 2007). “Breakdown of The Adiabatic Born –Oppenheimer Approximation in Graphene.” Nature Materials 6.3, pp. 198201. doi.org/10.1038/nmat1846.Google Scholar
Plutarch (1921). Lives. Vol. 10, Agis and Cleomenes, Tiberius and Caius Gracchus, Philopoemen and Flamninius. Loeb Classical Library. Cambridge, MA: Heinemann.Google Scholar
Popkin, Gabriel (June 16, 2017). “Spooky Action Achieved at Record Distance.” Science 356.6343, pp. 11101111.Google Scholar
Poplavskii, R. P. (1975). “Thermodynamical Models of Information Processing.” Uspekhi Fizicheskikh Nauk, Advances in Physical Sciences 115.3, pp. 465501.Google Scholar
Posen, Barry R. (2003). “Command of The Commons: The Military Foundation of US Hegemony.” International Security 28.1, pp. 546.Google Scholar
Prabhakar, Shashi et al. (2020). “Two-Photon Quantum Interference and Entanglement at 2.1 Mm.” Science Advances 6.13. advances.sciencemag.org/content/6/13/eaay5195.Google Scholar
Preskill, John (2012). “Quantum Computing and The Entanglement Frontier.” WSPC Proceedings. Rapporteur talk at the 25th Solvay Conference on Physics “The Theory of the Quantum World”. Brussels.Google Scholar
Preskill, John (October 6, 2019). “Why I Called It ‘Quantum Supremacy’.” Wired. wired.com/story/why-i-coined-the-term-quantum-supremacy.Google Scholar
“ProQuest Dissertations and Theses Global” (n.d.) (). Last accessed February 20, 2021. www.proquest.com/products-services/pqdtglobal.html.Google Scholar
PYMNTS (2018). “The Meal Kits Crowding Problem.” PYMNTS Subscriptions. www.pymnts.com/subscriptions/2018/meal-kits-crowding/.Google Scholar
Qiu, Longqing et al. (2016). “Development of a Squid-Based Airborne Full Tensor Gradiometer for Geophysical Exploration.” Seg Technical Program Expanded Abstracts. Society of Exploration Geophysicists.Google Scholar
Quan, Wei, Chen, Bikun, and Shu, Fei (2017). “Publish or Impoverish: an Investigation of The Monetary Reward System of Science in China (1999–2016).” Aslib Journal of Information Management 69 (5), pp. 486502.Google Scholar
Rabin, M. O. and Scott, D. (April 1959). “Finite Automata and Their Decision Problems.” IBM Journal, pp. 114125.Google Scholar
Rabkin, Jeremy A. and Yoo, John (2017). Striking Power: How Cyber, Robots, and Space Weapons Change The Rules for War. New York: Encounter Books.Google Scholar
RAND (2002). Space Weapons: Earth Wars. Santa Monica, CA: RAND.Google Scholar
Reardon, Joel (2016). Secure Data Deletion. New York: Springer.Google Scholar
Reece, Andrew G. and Danforth, Christopher M. (August 2017). “Instagram Photos Reveal Predictive Markers of Depression.” EPJ Data Science 6.1, pp. 15. doi.org/10.1140/epjds/s13688-017-0110-z.Google Scholar
Remington Rand (1954). Sorting Methods for UNIVAC Systems. www.bitsavers.org/pdf/univac/univac1/UnivacSortingMethods.pdf.Google Scholar
Ren, J. G. et al. (2017). “Ground-To-Satellite Quantum Teleportation.” Nature 549.7670, pp. 7073.Google Scholar
Rendell, Paul (2011). “A Universal Turing Machine in Conway's Game of Life.” 2011 International Conference on High Performance Computing and Simulation. IEEE, pp. 764772.Google Scholar
Repantis, Kate (March 19, 2014). “Why Hasn't Commercial Air Travel Gotten Any Faster Since The 1960s?” Slice of MIT. alum.mit.edu/slice/why-hasnt-commercial-air-travel-gotten-any-faster-1960s.Google Scholar
Research, Transparency Market (2017). “Ring Laser Gyroscope Market – Snapshot.” www.transparencymarketresearch.com/ring-laser-gyroscope-market.html.Google Scholar
Rich, Ben R. and Janos, Leo (1994). Skunk Works: a Personal Memoir of My Years at Lockheed. Boston, MA: Little, Brown.Google Scholar
Rid, Thomas (2020). Active Measures: The Secret History of Disinformation and Political Warfare. New York: Farrar, Straus and Giroux.Google Scholar
Rideout, Ariel (July 24, 2008). “Making Security Easier.” Official Gmail Blog.Google Scholar
Rivest, Ronald L. (2011). “The Early Days of RSA: History and Lessons.” In: ACM Turing Award Lectures. New York: Association for Computing Machinery, pp. 2002. doi.org/10.1145/1283920.1961920.Google Scholar
Rivest, Ronald L., Shamir, Adi, and Adleman, Len (February 1978). “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of The Association for Computing Machinery 21.2, pp. 120126. dl.acm.org/doi/10.1145/359340.359342.Google Scholar
Roberts, Siobhan (April 15, 2020). “John Horton Conway, a ‘Magical Genius’ in Math, Dies at 82.” New York Times. http://www.nytimes.com/2020/04/15/technology/john-horton-conway-dead-coronavirus.html.Google Scholar
Robinson, Andrew (2018). “Did Einstein Really Say That?Nature 557.7703, pp. 3031.Google Scholar
Robson, David P. (April 1984). “Profile Edwin H. Land.” Chem-Matters. www.cs.cornell.edu/~ginsparg/physics/Phys446-546/840412t.pdf.Google Scholar
Rose, Scott et al. (February 2019). Trustworthy Email. Tech. rep. SP 800-177 Rev. 1. National Institute of Standards and Technology. csrc.nist.gov/publications/detail/sp/800-177/rev-1/final.Google Scholar
Rowlett, Frank B. (1999). The Story of Magic: Memoirs of an American Cryptologic Pioneer. Laguna Hills, CA: Aegean Park Press.Google Scholar
Ruf, M. et al. (2019). “Optically Coherent Nitrogen-Vacancy Centers in Micrometer-Thin Etched Diamond Membranes.” Nano Lett 19.6, pp. 39873992.Google Scholar
Rule, Nicholas O. (January 2017). “Perceptions of Sexual Orientation From Minimal Cues.” Archives of Sexual Behavior 46.1, pp. 129139. doi.org/10.1007/s10508-016-0779-2.Google Scholar
Rzetenly, Xaq (September 23, 2017). “Is Beaming Down in Star Trek a Death Sentence?” Ars Technica. arstechnica.com/gaming/2017/09/is-beaming-down-in-star-trek-a-death-sentence/.Google Scholar
Sadkhan, S. B. and Yaseen, B. S. (2019). “DNA-Based Cryptanalysis: Challenges, and Future Trends.” 2019 2nd Scientific Conference of Computer Sciences (SCCS), pp. 2427.Google Scholar
Samuelson, Arielle (June 19, 2019). “What Is an Atomic Clock?” www.nasa.gov/feature/jpl/what-is-an-atomic-clock.Google Scholar
Sandia National Laboratories and National Nuclear Security Administration (2015). ASCR Workshop on Quantum Computing for Science. Electronic Book 1194404. www.osti.gov/servlets/purl/1194404/.Google Scholar
Saxenian, AnnaLee (1996). Regional Advantage: Culture and Competition in Silicon Valley and Route 128. Cambridge, MA: Harvard University Press.Google Scholar
Scarani, Valerio, Bechmann-Pasquinucci, H., et al. (2009). “The Security of Practical Quantum Key Distribution.” Reviews of Modern Physics 81.3, pp. 13011350.Google Scholar
Scarani, Valerio and Kurtsiefer, Christian (2014). “The Black Paper of Quantum Cryptography: Real Implementation Problems.” Theoretical Computer Science 560. Theoretical Aspects of Quantum Cryptography –celebrating 30 years of BB84, pp. 2732. www.sciencedirect.com/science/article/pii/S0304397514006938.Google Scholar
Schelling, Thomas C. (1980). The Strategy of Conflict: With a New Preface by The Author. Cambridge, MA: Harvard University Press.Google Scholar
Schiermeier, Quirin (2019). “Russia Joins Race to Make Quantum Dreams a Reality.” Nature 577.7788, pp. 14.Google Scholar
Schneier, Bruce (November 2007). “Did NSA Put a Secret Backdoor in New Encryption Standard?” Wired. Last accessed May 30, 2020. www.wired.com/2007/11/securitymatters-1115/.Google Scholar
Schofield, Jack (February 11, 2018). “John Perry Barlow Obituary.” The Guardian. www.theguardian.com/technology/2018/feb/11/john-perry-barlow-obituary.Google Scholar
Schumacher, Benjamin (April 1995). “Quantum Coding.” Physical Review A 51 (4), pp. 27382747. link.aps.org/doi/10.1103/PhysRevA.51.2738.Google Scholar
Sciutto, Jim (May 10, 2019). “A Vulnerable US Really Does Need a Space Force.” Wall Street Journal –Online Edition.Google Scholar
Scott, James C. (1998). Seeing Like a State: How Certain Schemes to Improve The Human Condition Have Failed. The Yale ISPS series. New Haven, CT: Yale University Press. www.gbv.de/dms/sub-hamburg/233487662.pdf.Google Scholar
Shamir, Adi (November 1979). “How to Share a Secret.” Communications of The Association for Computing Machinery 22.11, pp. 612613. doi.org/10.1145/359168.359176.Google Scholar
Shamir, Adi (1984). “Identity-Based Cryptosystems and Signature Schemes.” Advances in Cryptology: Proceedings of CRYPTO 84. Vol. 7. Santa Barbara, California, pp. 4753.Google Scholar
Shamir, Adi (2011). “Cryptography: State of The Science.” In: ACM Turing Award Lectures. New York: Association for Computing Machinery, pp. 2002. doi.org/10.1145/1283920.1961903.Google Scholar
Shankland, Stephen (June 29, 2019). “Startup Packs All 16GB of Wikipedia Onto DNA Strands to Demonstrate New Storage Tech.” www.cnet.com/news/startup-packs-all-16gb-wikipedia-onto-dna-strands-demonstrate-new-storage-tech/.Google Scholar
Shannon, Claude Elwood (1948). “A Mathematical Theory of Communication.” The Bell System Technical Journal 27.3, pp. 379423.Google Scholar
Shannon, Claude Elwood (1949). Communication Theory of Secrecy Systems. New York: ATT.Google Scholar
Shkel, Andrei M. (2010). “Precision Navigation and Timing Enabled by Microtechnology: Are We There Yet?SENSORS, 2010 IEEE. IEEE. Waikoloa Village, HI, pp. 59.Google Scholar
Shor, Peter W. (October 1997). “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Journal on Computing 26.5, pp. 14841509. dx.doi.org/10.1137/S0097539795293172.Google Scholar
Shostack, Adam (August 27, 2009). “The Threats to Our Products.” Microsoft Security Blog. www.microsoft.com/security/blog/2009/08/27/the-threats-to-our-products/.Google Scholar
Shostack, Adam (2014). Threat Modeling: Designing for Security. New York: Wiley.Google Scholar
Simonite, Tom (March 23, 2016). “Intel Puts The Brakes on Moore's Law.” MIT Technology Review.Google Scholar
Singer, P. W. and Cole, August (2015). Ghost Fleet: a Novel of The Next World War. Boston, MA: Houghton Mifflin Harcourt.Google Scholar
Singh, Simon (August 29, 2000). The Code Book: The Science of Secrecy From Ancient Egypt to Quantum Cryptography. London: Anchor.Google Scholar
Sipser, Michael (2012). Introduction to The Theory of Computatio. 3rd ed. Independence, KY: Cengage Learning.Google Scholar
Sitz, Greg (February 2005). “Approximate Challenges.” Nature 433.7025. doi.org/10.1038/433470a.Google Scholar
Smith, Brad (October 26, 2018). “Technology and The US Military.” Microsoft On The Issues. blogs.microsoft.com/on-the-issues/2018/10/26/technology-and-the-us-military/.Google Scholar
Sola Pool, Ithiel de (1983). Technologies of Freedom. Cambridge, MA: Harvard University Press.Google Scholar
Solove, Daniel J. (2007). “‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy.” San Diego Law Review 44.4, pp. 745772.Google Scholar
Spiegel, Peter (October 25, 2013). “Angela Merkel Eyes Place for Germany in US Intelligence Club.” Financial Times.Google Scholar
Spinellis, D. (May 2008). “The Antikythera Mechanism: A Computer Science Perspective.” Computer 41.5, pp. 2227.Google Scholar
Springer, Paul J. (2020). Cyber Warfare: A Documentary and Reference Guide. Santa Barbara, CA: ABC-CLIO. products.abc-clio.com/abc-cliocorporate/product.aspx?pc=A6167C.Google Scholar
Starr, Michelle (January 19, 2014). “Fridge Caught Sending Spam Emails in Botnet Attack.” CNet. www.cnet.com/news/fridge-caught-sending-spam-emails-in-botnet-attack/.Google Scholar
Steele, Beth Anne (November 26, 2019). “Oregon FBI Tech Tuesday: Securing Smart TVs.” FBI Portland. www.fbi.gov/contact-us/field-offices/portland/news/press-releases/tech-tuesdaysmart-tvs.Google Scholar
Stern, Jessica (1999). The Ultimate Terrorist. Cambridge, MA: Harvard University Press.Google Scholar
Stevens, Hallam (January 30, 2018). “Hans Peter Luhn and The Birth of The Hashing Algorithm.” IEEE Spectrum. spectrum.ieee.org/tech-history/silicon-revolution/hans-peter-luhn-and-the-birth-of-the-hashing-algorithm.Google Scholar
Storbeck, Olaf and Chazan, Guy (June 28, 2020). “Germany to Overhaul Accounting Regulation after Wirecard Collapse.” Financial Times.Google Scholar
Strunsky, Steve (August 8, 2013). “N.J. Man Fined $32K for Illegal GPS Device That Disrupted Newark Airport System.” NJ Advance Media. www.nj.com/news/2013/08/man_fined_32000_for_blocking_newark_airport_tracking_system.html.Google Scholar
Susskind, Leonard (2008). The Black Hole War: My Battle with Stephen Hawking to Make The World Safe for Quantum Mechanics. Boston, MA: Little, Brown and Company.Google Scholar
Svoboda, Karel and Yasuda, Ryohei (2006). “Principles of Two-Photon Excitation Microscopy and Its Applications to Neuroscience.” Neuron 50.6, pp. 823839.Google Scholar
Symul, T., Assad, S. M., and Lam, P. K. (2011). “Real Time Demonstration of High Bitrate Quantum Random Number Generation with Coherent Laser Light.” Applied Physics Letters 98.23, pp. 231103.Google Scholar
Takemoto, Kazuya et al. (September 2015). “Quantum Key Distribution Over 120 km Using Ultrahigh Purity Single-Photon Source and Superconducting Single-Photon Detectors.” Scientific Reports 5.1, pp. 14383. doi.org/10.1038/srep14383.Google Scholar
Tambe, Milind (2012). Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge: Cambridge University Press.Google Scholar
Tapley, B. D. et al. (2004). “The Gravity Recovery and Climate Experiment: Mission Overview and Early Results.” Geophysical Research Letters 31.9.Google Scholar
Taylor, Michael A. and Bowen, Warwick P. (2016). “Quantum Metrology and Its Application in Biology.” Physics Reports 615, pp. 159.Google Scholar
Temperton, James (January 26, 2017). “Got a Spare $15 Million? Why Not Buy Your Very Own D-Wave Quantum Computer.” Wired UK.Google Scholar
Thorton, Will (October 16, 2018). “Selective Availability: A Bad Memory for GPS Developers and Users.” Spirent Blog. www.spirent.com/blogs/selective-availability-a-bad-memory-for-gps-developers-and-users.Google Scholar
Tierney, Tim M. et al. (2019). “Optically Pumped Magnetometers: From Quantum Origins to Multi-Channel Magnetoencephalography.” NeuroImage 199, pp. 598608. www.sciencedirect.com/science/article/pii/S1053811919304550.Google Scholar
Tirosh, Ofer (January 8, 2020). “Top Translation Industry Trends for 2020.” Tomedes Translator's Blog. www.tomedes.com/translator-hub/translation-industry-trends-2020.Google Scholar
Toffoli, Tommaso (1977). Journal of Computer and System Sciences 15, pp. 213231.Google Scholar
Toffoli, Tommaso (1982). “Physics and Computation.” International Journal of Theoretical Physics 21.3, pp. 165175.Google Scholar
Tretkoff, Ernie (December 2007). “This Month in Physics History: December 1938: Discovery of Nuclear Fission.” APS News 16.11. www.aps.org/publications/apsnews/200712/physicshistory.cfm.Google Scholar
Tsividis, Yannis (December 1, 2017). “Not Your Father's Analog Computer.” IEEE Spectrum. spectrum.ieee.org/computing/hardware/not-your-fathers-analog-computer.Google Scholar
Turing, Alan M. (1936). “On Computable Numbers, with an Application to The Entscheidungsproblem.” Proceedings of The London Mathematical Society 2.42, pp. 230265. www.cs.helsinki.fi/u/gionis/cc05/OnComputableNumbers.pdf.Google Scholar
Uhlmann, Jeffrey, Lanzagorta, Marco, and Venegas-Andraca, Salvador E. (2015). “Quantum Communications in The Maritime Environment.” OCEANS 2015 – MTS/IEEE Washington, pp. 110.Google Scholar
Union of Concerned Scientists (May 1, 2021). “UCS Satellite Database.” Last accessed July 25, 2021. www.ucsusa.org/resources/satellite-database.Google Scholar
United Nations (1986). Principles Relating to Remote Sensing of The Earth From Outer Space. Resolution adopted by the General Assembly/United Nations, 41/65. New York: United Nations.Google Scholar
US Agency for International Development, Bureau for Africa (July 2019). “Government Complicity in Organized Crime.” pdf.usaid.gov/pdf_docs/PA00TSH2.pdf.Google Scholar
US Air Force Scientific Advisory Board (2016). Utility of Quantum Systems for The Air Force Study Abstract. Tech. rep. US Air Force Scientific Advisory Board. web.archive.org/web/20170427005155/www.scientificadvisoryboard.af.mil/Portals/73/documents/AFD-151214-041.pdf?ver=2016-08-19-101445-230.Google Scholar
US Census Bureau (2021). “US and World Population Clock.” Last accessed January 1, 2021. www.census.gov/popclock/.Google Scholar
US Congress (2018). National Quantum Initiative Act. [US Government Publishing Office]. purl.fdlp.gov/GPO/gpo126751.Google Scholar
US Congress, House Permanent Select Committee on Intelligence (2016). “Executive Summary of Review of The Unauthorized Disclosures of Former National Security Agency Contractor Edward Snowden.” purl.fdlp.gov/GPO/gpo75954.Google Scholar
US Federal Communications Commission (April 2020). “Jammer Enforcement.” www.fcc.gov/general/jammer-enforcement.Google Scholar
Vandersypen, Lieven M. K. et al. (2001). “Experimental Realization of Shor's Quantum Factoring Algorithm Using Nuclear Magnetic Resonance.” Nature 414.6866, pp. 883887.Google Scholar
Venegas-Andraca, Salvador E., Lanzagorta, M., and Uhlmann, J. (2015). “Maritime Applications of Quantum Computation.” OCEANS 2015 – MTS/IEEE Washington, pp. 18.Google Scholar
Vidas, Timothy, Votipka, Daniel, and Christin, Nicolas (2011). “All Your Droid Are Belong to Us: A Survey of Current Android Attacks.” Proceedings of The 5th USENIX Conference on Offensive Technologies. WOOT’11. San Francisco, CA: USENIX Association, pp. 10.Google Scholar
von Neumann, John (1945). First Draft of a Report on The EDVAC. Tech. rep. United States Army Ordnance Department and the University of Pennsylvania.Google Scholar
von Neumann, John (1951). “Various Techniques Used in Connection with Random Digits.” Journal of Research, Applied Math Series 3. Summary written by George E. Forsythe, pp. 3638. mcnp.lanl.gov/pdf_files/nbs_vonneumann.pdf.Google Scholar
von Neumann, John and Burks, Arthur W. (1966). Theory of Self-Reproducing Automata. Champaign, IL: University of Illinois Press.Google Scholar
Wagner, Michelle (2006). “The Inside Scoop on Mathematics at The NSA.” Math Horizons 13.4, pp. 2023.Google Scholar
Walden, David (2011). “Early Years of Basic Computer and Software Engineering.” In: A Culture of Innovation: Insider Accounts of Computing and Life at BBN. East Sandwich, MA: Waterside Publishing.Google Scholar
Wallace, D. and Costello, J. (July 2017). “Eye in The Sky: Understanding The Mental Health of Unmanned Aerial Vehicle Operators.” Journal of The Military and Veterans’ Health 25.3. jmvh.org/article/eye-in-the-sky-understanding-the-mental-health-of-unmanned-aerial-vehicle-operators/.Google Scholar
Wang, Hai-Tian et al. (August 2019). “Science with The TianQin Observatory: Preliminary Results on Massive Black Hole Binaries.” Physical Review D 100.4, pp. 043003. link.aps.org/doi/10.1103/PhysRevD.100.043003.Google Scholar
Wang, Y. and Kosinski, M. (2018). “Deep Neural Networks Are More Accurate Than Humans at Detecting Sexual Orientation From Facial Images.” Journal of Personality and Social Psychology 114.2, pp. 246257.Google Scholar
Wang, Yunfei et al. (2019). “Efficient Quantum Memory for Single-Photon Polarization Qubits.” Nature Photonics 13.5, pp. 346351. doi.org/10.1038/s41566-019-0368-8.Google Scholar
Watson, James D. and Crick, Francis H. C. (1953). “Molecular Structure of Nucleic Acids: a Structure for Deoxyribose Nucleic Acid.” Nature 171.4356, pp. 737738.Google Scholar
Wehner, S., Elkouss, D., and Hanson, R. (2018). “Quantum Internet: A Vision for The Road Ahead.” Science 362.6412.Google Scholar
Weinbaum, Cortney et al. (2017). SIGINT for Anyone: The Growing Availability of Signals Intelligence in The Public Domain. RAND Perspective; 273. Santa Monica, CA: RAND. www.rand.org/pubs/perspectives/PE273.html.Google Scholar
Weiner, S. et al. (2020). “A Flight Capable Atomic Gravity Gradiometer With a Single Laser.” 2020 IEEE International Symposium on Inertial Sensors and Systems (INERTIAL), pp. 13.CrossRefGoogle Scholar
Wertheimer, Michael (2015). “Encryption and The NSA Role in International Standards.” Notices of The AMS. Note: At the time of publication, Michael Wertheimer was the Director of Research at the US National Security Agency. Last accessed May 30, 2020. www.ams.org/notices/201502/rnoti-p165.pdf.Google Scholar
Weyers, Stefan (2020). “Unit of Time Working Group 4.41.” Last accessed October 9, 2020. www.ptb.de/cms/en/ptb/fachabteilungen/abt4/fb-44/ag-441/realisation-of-the-si-second/history-of-the-unit-of-time.html.Google Scholar
Wheeler, John Archibald (1982). “The Computer and The Universe.” International Journal of Theoretical Physics 21.6, pp. 557572.Google Scholar
Wheeler, John Archibald (1983). “On Recognizing ‘Law Without Law,’ Oersted Medal Response at The Joint APS–AAPT Meeting, New York, 25 January 1983.” American Journal of Physics 51.5, pp. 398404. aapt.scitation.org/doi/pdf/10.1119/1.13224.Google Scholar
Whitfield, Stephen E. and Roddenberry, Gene (1968). The Making of Star Trek. New York: Ballantine Books.Google Scholar
Whitten, Alma and Tygar, J. D. (1999). “Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0.” Proceedings of The 8th USENIX Security Symposium. Washington, DC.Google Scholar
Wiesner, Stephen (January 1983). “Conjugate Coding.” SIGACT News 15.1. Original manuscript written circa 1970, pp. 7888. doi.org/10.1145/1008908.1008920.Google Scholar
Winner, Langdon (2018). “Do Artifacts Have Politics?Daedalus 109:1, pp. 121136.Google Scholar
Winterbotham, F. W. (1974). The Ultra Secret. New York: Harper and Row.Google Scholar
Wolfram, Stephen (2002). A New Kind of Science. English. Champaign, IL: Wolfram Media. www.wolframscience.com.Google Scholar
Woo, Jesse, Swire, Peter, and Desai, Deven R. (2019). “The Important, Justifiable, and Constrained Role of Nationality in Foreign Intelligence Surveillance.” Hoover Institution Aegis Series Paper 1901.Google Scholar
Wood, Laura (March 14, 2019). “Global $15.6Bn Signals Intelligence (SIGINT) Market by Type, Application and Region – Forecast to 2023 2013 ResearchAndMarkets.com.” BusinessWire.Google Scholar
Wright, Robert (April 1988). “Did The Universe Just Happen?” The Atlantic. www.theatlantic.com/past/docs/issues/88apr/wright.htm.Google Scholar
Wu, Jun et al. (2016). “The Study of Several Key Parameters in The Design of Airborne Superconducting Full Tensor Magnetic Gradient Measurement System.” 2016 SEG International Exposition and Annual Meeting. Dallas, Texas: Society of Exploration Geophysicists, pp. 15881591.Google Scholar
Xu, Nanyang et al. (March 2012). “Quantum Factorization of 143 on a Dipolar-Coupling Nuclear Magnetic Resonance System.” Physical Review Letters 108.13, pp. 130501. link.aps.org/doi/10.1103/PhysRevLett.108.130501.Google Scholar
Yan, Wei-Bin and Fan, Heng (April 2014). “Single-Photon Quantum Router with Multiple Output Ports.” Scientific Reports 4.1, pp. 4820. doi.org/10.1038/srep04820.Google Scholar
Yardley, Herbert O. (1931). The American Black Chamber. London: The Bobbs-Merrill Company.Google Scholar
Yin, Juan et al. (June 16, 2017). “Satellite-Based Entanglement Distribution Over 1200 Kilometers.” Science 356.6343, pp. 11401144.Google Scholar
Yoo, J. (2020). “Rules for The Heavens: The Coming Revolution in Space and The Laws of War.” University of Illinois Law Review 2020.1, pp. 123194.Google Scholar
Yuan, Z. S. et al. (2008). “Experimental Demonstration of a BDCZ Quantum Repeater Node.” Nature 454.7208, pp. 1098101.Google Scholar
Zach, Dorfman (December 21, 2020). “China Used Stolen Data to Expose CIA Operatives in Africa and Europe.” foreignpolicy.com/2020/12/21/china-stolen-us-data-exposed-cia-operatives-spy-networks/.Google Scholar
Zelnio, Ryan (January 6, 2006). “The Effects of Export Control on The Space Industry.” The Space Review.Google Scholar
Zetter, Kim (January 12, 2018). “Google to Stop Censoring Search Results in China After Hack Attack.” Wired. www.wired.com/2010/01/google-censorship-china/.Google Scholar
Zhang, Hao et al. (2018). “Quantized Majorana Conductance.” Nature 556.7699, pp. 7479. doi.org/10.1038/nature26142.Google Scholar
Zhong, Han-Sen et al. (2020). “Quantum Computational Advantage Using Photons.” Science 370.6523, pp. 14601463. science.sciencemag.org/content/370/6523/1460.Google Scholar
Zissis, Carin (February 2007). “China's Anti-Satellite Test.” www.cfr.org/backgrounder/chinas-anti-satellite-test.Google Scholar
Zuboff, Shoshana (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at The New Frontier of Power. New York: PublicAffairs.Google Scholar
Zuckoff, Mitchell (2005). Ponzi's Scheme: The True Story of a Financial Legend. New York: Random House.Google Scholar
Zukav, Gary (1979). The Dancing Wu Li Masters. William Morrow.Google Scholar
Zweben, Stuart and Bizot, Betsy (2019). 2019 Taulbee Survey. cra.org/resources/taulbee-survey/.Google Scholar
Zyga, Lisa (November 28, 2014). “New Largest Number Factored on a Quantum Device Is 56,153.” phys.org/news/2014-11-largestfactored-quantum-device.html.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×