Konferenzen  >  Mathematik  >  Kryptographie, Blockchain und Informationssicherheit

Wählen Sie ein Land aus
ALLE LÄNDER (5)
1
ARES '25 — 20th International Conference on Availability, Reliability and Security
11. Aug 2025 - 14. Aug 2025 • Gent, Belgien
Veranstalter:
Ghent University (BE), in collaboration with SBA Research (AT)
Zusammenfassung:
The 20th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES highlights the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES emphasizes the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.
Kontakt:
Tel.: [+32 9 264 33 67];     Email: ares@ugent.be
Themen:
Authorization, Authentication, Access Control, Automated Vulnerability Repair, Availability, Confidentiality, Integrity, Botnets and Botnet Monitoring, Cloud Security, Compliance, Certification, Legal aspects related to Security and Privacy, Dependability, Resilience, Digital Forensics, Human Factors in Security and Privacy Identity Management, Incident Response and Prevention, Intrusion Detection, Fraud Detection, Machine Learning for Security and Privacy, Security and Privacy for Machine Learning, Mobile Security, Network Security, Privacy-Enhancing Technologies (PETs), Process based Security Models and Methods, Risk analysis, Side Channel Attacks, Software Security, Static and Dynamic Code Analysis for Security and Privacy, Security and Privacy for IoT, Cyber-Physical Systems, Critical Infrastructures, Security and Privacy Awareness, Security Requirements, Secure Design of Applications, Usable Security and Privacy, Threats and Attack Modelling, Trusted Computing, Trust Models, Trust Management, Web Application Security and Privacy
Eintrags-ID:
1651323
2
webinar — Optica Online Industry Meeting: Quantum Key Distribution
09. Sep 2025 • online, Virtuelle Veranstaltung
Veranstalter:
Optica
Zusammenfassung:
Join us for the OPTICA Online Industry Meeting on Quantum Key Distribution (QKD), where experts will discuss the latest developments and future prospects of secure communication technologies. This event will address the current challenges in QKD implementation, such as achieving long-distance quantum entanglement distribution, overcoming noise and loss in quantum channels, and integrating QKD with existing network infrastructures. These challenges are crucial to ensure the reliability and scalability of quantum-secure communication systems. The meeting will also highlight the opportunities presented by QKD, including unparalleled security through quantum principles, resistance against cryptographic attacks by quantum computers, and the potential to establish global secure communication networks.
Themen:
Key topics will include advancements in quantum repeaters, quantum cryptography protocols, and practical applications of QKD in sectors such as finance, healthcare, and government. Engage with industry leaders to explore strategies for advancing QKD technology and its role in shaping the future of secure communications.
Eintrags-ID:
1628642
3
BL2025 — Blockchain Life 2025
28. Okt 2025 - 29. Okt 2025 • Dubai, Vereinigte Arabische Emirate
Zusammenfassung:
The 15th Blockchain Life Forum is the highly anticipated crypto event of 2025, drawing over 12,000 attendees, including leading figures in web3, cryptocurrencies, and mining. This premier gathering will feature founders and top executives from the industry's most prestigious companies, who will share crucial strategies for capitalizing on the upcoming Bull Run. Moreover, attendees will enjoy exclusive access to behind-the-scenes negotiations and gain valuable insights from private discussions. With unparalleled networking opportunities within this elite community, Blockchain Life 2025 is positioned to be the must-attend event shaping the future of the crypto industry.
Eintrags-ID:
1638536
4
Dagstuhl-Seminar — Symmetric Cryptography
01. Feb 2026 - 06. Feb 2026 • Schloss Dagstuhl, Deutschland
Veranstalter:
Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH
Zusammenfassung:
IT Security plays a vital role in our society. For example, when multiple parties communicate via a mobile phone or chat, or during online shopping, security takes a decisive part in protecting the users, the service operators, and in maintaining public confidence in the system. Cryptography is an essential concept to be implemented in the underlying system. Modern cryptography can be divided into two distinct subareas, symmetric cryptography (where all parties share the same secret key) and asymmetric cryptography (where all parties are in possession of a public key and a private key). We plan to discuss in detail timely topics related to the design and analysis of symmetric cryptographic schemes.
Eintrags-ID:
1670464
5
Workshop — Novel lattice assumptions
13. Jul 2026 - 17. Jul 2026 • ICMS, Bayes Centre, Edinburgh , Großbritannien
Veranstalter:
The International Centre for Mathematical Sciences (ICMS)
Zusammenfassung:
While lattice-based cryptography has been successful, a consensus is forming that we have reached a limit of what we can do from such well-established problems. Thus, researchers are introducing novel variants of these presumed-hard problems to develop quantum-safe privacy-enhancing technologies (PETs). Many PETs lack efficient lattice-based or other efficient post-quantum constructions. Examples include advanced encryption schemes with fine-grained access control, blind signatures, anonymous credentials, oblivious PRFs, and threshold constructions. Adopting novel hardness assumptions reflects a long-standing tension in cryptography: more structure enables advanced functionalities but may offer flexibility to solve presumed-hard problems, invalidating their hardness. As these assumptions proliferate, the risk grows that they remain understudied and may lack the robustness to serve as foundations for a privacy-respecting post-quantum digital society.
Eintrags-ID:
1670115


Conference-Service.com stellt der Öffentlichkeit ein Kalendarium wichtiger Konferenzen, Symposien und sonstiger Tagungen im wissenschaftlich-technischen Bereich zur Verfügung. Obwohl das Verzeichnis mit großer Sorgfalt zusammengestellt und ständig aktualisiert wird, weisen wir auf die Möglichkeit von Fehlern ausdrücklich hin. Bitte vergewissern Sie sich immer beim Veranstalter, bevor Sie über die Teilnahme oder Nichtteilnahme an einer Konferenz entscheiden.

Kein Tracking | Keine Pop-ups | Keine Animationen
Stand vom 23. Juli 2025