Conférences  >  Mathématiques  >  Cryptographie, blockchain et sécurité de l'information

Sélecionner un pays
TOUS LES PAYS (5)
1
ARES '25 — 20th International Conference on Availability, Reliability and Security
11 aou 2025 - 14 aou 2025 • Gand, Belgique
Organisateur:
Ghent University (BE), in collaboration with SBA Research (AT)
Résumé:
The 20th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES highlights the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES emphasizes the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.
Contact:
Tél.: [+32 9 264 33 67];     Email.: ares@ugent.be
Sujets:
Authorization, Authentication, Access Control, Automated Vulnerability Repair, Availability, Confidentiality, Integrity, Botnets and Botnet Monitoring, Cloud Security, Compliance, Certification, Legal aspects related to Security and Privacy, Dependability, Resilience, Digital Forensics, Human Factors in Security and Privacy Identity Management, Incident Response and Prevention, Intrusion Detection, Fraud Detection, Machine Learning for Security and Privacy, Security and Privacy for Machine Learning, Mobile Security, Network Security, Privacy-Enhancing Technologies (PETs), Process based Security Models and Methods, Risk analysis, Side Channel Attacks, Software Security, Static and Dynamic Code Analysis for Security and Privacy, Security and Privacy for IoT, Cyber-Physical Systems, Critical Infrastructures, Security and Privacy Awareness, Security Requirements, Secure Design of Applications, Usable Security and Privacy, Threats and Attack Modelling, Trusted Computing, Trust Models, Trust Management, Web Application Security and Privacy
Identifiant de l'évènement:
1651323
2
webinar — Optica Online Industry Meeting: Quantum Key Distribution
09 sep 2025 • online, Virtuel (en ligne)
Organisateur:
Optica
Résumé:
Join us for the OPTICA Online Industry Meeting on Quantum Key Distribution (QKD), where experts will discuss the latest developments and future prospects of secure communication technologies. This event will address the current challenges in QKD implementation, such as achieving long-distance quantum entanglement distribution, overcoming noise and loss in quantum channels, and integrating QKD with existing network infrastructures. These challenges are crucial to ensure the reliability and scalability of quantum-secure communication systems. The meeting will also highlight the opportunities presented by QKD, including unparalleled security through quantum principles, resistance against cryptographic attacks by quantum computers, and the potential to establish global secure communication networks.
Sujets:
Key topics will include advancements in quantum repeaters, quantum cryptography protocols, and practical applications of QKD in sectors such as finance, healthcare, and government. Engage with industry leaders to explore strategies for advancing QKD technology and its role in shaping the future of secure communications.
Identifiant de l'évènement:
1628642
3
BL2025 — Blockchain Life 2025
28 oct 2025 - 29 oct 2025 • Dubai, Émirats arabes unis
Résumé:
The 15th Blockchain Life Forum is the highly anticipated crypto event of 2025, drawing over 12,000 attendees, including leading figures in web3, cryptocurrencies, and mining. This premier gathering will feature founders and top executives from the industry's most prestigious companies, who will share crucial strategies for capitalizing on the upcoming Bull Run. Moreover, attendees will enjoy exclusive access to behind-the-scenes negotiations and gain valuable insights from private discussions. With unparalleled networking opportunities within this elite community, Blockchain Life 2025 is positioned to be the must-attend event shaping the future of the crypto industry.
Identifiant de l'évènement:
1638536
4
Dagstuhl-Seminar — Symmetric Cryptography
01 fév 2026 - 06 fév 2026 • Schloss Dagstuhl, Allemagne
Organisateur:
Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH
Résumé:
IT Security plays a vital role in our society. For example, when multiple parties communicate via a mobile phone or chat, or during online shopping, security takes a decisive part in protecting the users, the service operators, and in maintaining public confidence in the system. Cryptography is an essential concept to be implemented in the underlying system. Modern cryptography can be divided into two distinct subareas, symmetric cryptography (where all parties share the same secret key) and asymmetric cryptography (where all parties are in possession of a public key and a private key). We plan to discuss in detail timely topics related to the design and analysis of symmetric cryptographic schemes.
Identifiant de l'évènement:
1670464
5
Workshop — Novel lattice assumptions
13 jul 2026 - 17 jul 2026 • ICMS, Bayes Centre, Edinburgh , Royaume-Uni
Organisateur:
The International Centre for Mathematical Sciences (ICMS)
Résumé:
While lattice-based cryptography has been successful, a consensus is forming that we have reached a limit of what we can do from such well-established problems. Thus, researchers are introducing novel variants of these presumed-hard problems to develop quantum-safe privacy-enhancing technologies (PETs). Many PETs lack efficient lattice-based or other efficient post-quantum constructions. Examples include advanced encryption schemes with fine-grained access control, blind signatures, anonymous credentials, oblivious PRFs, and threshold constructions. Adopting novel hardness assumptions reflects a long-standing tension in cryptography: more structure enables advanced functionalities but may offer flexibility to solve presumed-hard problems, invalidating their hardness. As these assumptions proliferate, the risk grows that they remain understudied and may lack the robustness to serve as foundations for a privacy-respecting post-quantum digital society.
Identifiant de l'évènement:
1670115


Conference-Service.com met à la disposition de ses visiteurs des listes de conférences et réunions dans le domaine scientifique. Ces listes sont publiées pour le bénéfice des personnes qui cherchent une conférence, mais aussi, bien sûr, pour celui des organisateurs. Noter que, malgré tout le soin que nous apportons à la vérification des données entrées dans nos listes, nous ne pouvons accepter de responsabilité en ce qui concerne leur exactitude ou étendue. Pensez donc à vérifier les informations présentées avec les organisateurs de la conférence ou de la réunion avant de vous engager à y participer!

Y'a pas de suivi | Y'a pas de pop-ups | Y'a pas d'animations
Dernière mise à jour: 23 juillet 2025