{"id":646,"date":"2021-02-13T17:03:14","date_gmt":"2021-02-13T17:03:14","guid":{"rendered":"http:\/\/www.quantum5.eu\/home\/"},"modified":"2021-11-12T11:27:42","modified_gmt":"2021-11-12T11:27:42","slug":"home","status":"publish","type":"page","link":"https:\/\/www.quantum5.eu\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"container-fluid boldgrid-section\">\n<div class=\"container\">\n<div class=\"row call-to-action-wrapper\">\n<div class=\"col-md-7 col-xs-12 col-sm-12\"><\/div>\n<div class=\"col-md-5 col-xs-12 col-sm-12\">\n<div class=\"call-to-action\">\n<h2 class=\"slogan\">Quantum Cybersecurity in 5G Networks<\/h2>\n<p class=\"\">NATO SPS G5894 Project<\/p>\n<div class=\"row bg-editor-hr-wrap\">\n<div class=\"col-md-12 col-xs-12 col-sm-12\">\n<div>\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/zo_8z-Y6sjo\" allowfullscreen=\"allowfullscreen\" width=\"457\" height=\"287\" frameborder=\"0\"><span style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" data-mce-type=\"bookmark\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\n<div>\n<hr>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"tagline\">The development of the fifth generation of cellular networks (5G) is gaining momentum and, given its wide field of application, special attention is being paid to security mechanisms. One of the ways to achieve information-security levels of security is the application of quantum cryptography based on quantum laws of nature. The QUANTUM5 project will demonstrate the application of quantum cryptography in 5G cellular networks with a focus on generating a reliable QKD 5G simulator.<\/p>\n<p class=\"p-button-primary\"><a class=\"button-primary\" href=\"http:\/\/www.quantum5.eu\/overview\/\">MORE DETAILS<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Quantum Cybersecurity in 5G Networks NATO SPS G5894 Project \ufeff The development of the fifth generation of cellular networks (5G) is gaining momentum and, given its wide field of application, special attention is being paid to security mechanisms. One of the ways to achieve information-security levels of security is the application of quantum cryptography based [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page_home.php","meta":{"footnotes":""},"class_list":["post-646","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/www.quantum5.eu\/index.php?rest_route=\/wp\/v2\/pages\/646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.quantum5.eu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.quantum5.eu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.quantum5.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quantum5.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=646"}],"version-history":[{"count":10,"href":"https:\/\/www.quantum5.eu\/index.php?rest_route=\/wp\/v2\/pages\/646\/revisions"}],"predecessor-version":[{"id":822,"href":"https:\/\/www.quantum5.eu\/index.php?rest_route=\/wp\/v2\/pages\/646\/revisions\/822"}],"wp:attachment":[{"href":"https:\/\/www.quantum5.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}