Conferences In Information Security

Conference Name International Symposium Recent Developments in Cryptography and Information Security
Venue Oriahovitza, Bulgaria
URL http://www.cryptobg.org/
Submission Deadline 15-Jun
Conference Date September 3-5  2010
Sponsership/Publisher
Aim/Scope/Research Area To ensure the digital security for our business and e-life tomorrow, we must foresee and work for what will be after tomorrow.

The aim of this already traditional International Symposium on Recent Developments in Cryptography and Information Security is to Bridge the Theory with Practice. We gather world-leading experts with Bulgarian and international researchers, students and IT-enabled businesses. The latest trends and state-of-the-art open problems are linked to practical aspects and case studies on use or miss-use of the information, our digital identity and trust. We want to foster forming the Bulgarian research and scientific community, serving the IT industry, all IT-enabled services (like banking, e-Health, e-Administration, industries), and the Knowledge Society in Bulgaria, as part of the Global e-World.

It starts with encoding messages and providing confidential sender-receiver channel, the basis of Cryptography. Numerous mathematical methods, such as number theory, combinatorics, coding theory, complexity theory and algorithms, are applied for secure transmission of messages. Fast-growing technologies serve both the healthy and the dark side. The challenge is to construct high-complexity encodings that would still take millions of years for decoding with the most powerful supercomputer and the most efficient known attacks. Cryptography is practically everywhere, in all software or hardware system – internet, emailing, mobile devices, access control and password authentication, digital signatures, network and systems security.

Cryptography is the basis, but not a guarantee for Information Security – the complex area which controls the risks related to the use of various computer systems and creates computer platforms, languages and applications which follow certain security rules. Here we combine technologies with methodologies, organization and awareness for higher internet security, systems and mobile security, content protection, digital rights management, etc.

MAIN SUBJECTS AND TOPICS
The names of lecturers and topics covered so far provide a sound basis for the next CryptoBG 2009 Symposium (www.cryptobg.org). The main themes will be dedicated, but not limited to:
* blind signatures and e-voting schemes;
* cryptography and security of personal secure devices;
* hash functions;
* public key cryptography (PKC);
* elliptic curve cryptography (ECC);

The program will include also a traditional session and a round table on “Bridging Theory with Practice”.
WHO SHOULD AT

Back To Conferences List

Database Sections