Side-channel analysis (SCA) and implementation attacks have become an important field of research at universities and in the industry. In order to enhance the resistance of cryptographic and security critical implementations within the design phase, constructive attacks and analyzing techniques may serve as a quality metric to optimize the design and development process. Since 2010, COSADE provides an international platform for researchers, academics, and industry participants to present their work and their current research topics. It is an excellent opportunity to exchange on new results with international experts and to initiate new collaborations and information exchange at a professional level. The workshop will feature both invited presentations and contributed talks.
The tenth International Workshop on Constructive Side-Channel Analysis and Secure Design will be organized and held by the Technical University of Darmstadt.
ICNT 2019 will offer an extensive program of interest to academia, government and industry. It will include several distinguished keynote speakers and three conference days full of parallel sessions, Cairo city visiting, etc. A series of exciting speeches to develop skills in and advance awareness of requirements engineering practices is of particular interest to industry.
Zer0Con is POC’s NEW ‘CLOSED’ international security conference. It focuses on finding, analyzing, and exploiting vulnerabilities. Zer0Con aims to have high-level technical presentations.
? It is a high-level and closed conference.
? It only focuses on finding, analyzing, exploiting vulnerabilities.
? Only speakers, attendees, and sponsors will share vulnerabilities information.
? Zer0Con attendees can share various information and establish unique community.
? Training courses also focus on finding, analyzing, exploiting vulnerabilities.
? If you have certain level of ability to find bugs and make exploit code, you will improve yourself through Zer0Con.
The internet of things (IoT) is a platform that allows a network of devices (sensors, smart meters, etc.) to communicate, analyse data and process information collaboratively in the service of individuals or organisations. The IoT network can generate large amounts of data in a variety of formats and using different protocols which can be stored and processed in the cloud. The conference looks to address the issues surrounding IoT devices, their interconnectedness and services they may offer, including efficient, effective and secure analysis of the data IoT produces using machine learning and other advanced techniques, models and tools, and issues of security, privacy and trust that will emerge as IoT technologies mature and become part of our everyday lives.
Big Data (BD) has core values of volume, velocity, variety and veracity. After collecting much data from IoT, BD can be jointly used with machine learning, AI, statistical and other advanced techniques, models and methods, which can create values for people and organizations adopting it, since forecasting, deep analysis and analytics can help identify weaknesses and make improvements based on different analysis.
Maintaining a high level of security and privacy for data in IoT are crucial and we welcome recommendations, solutions, demonstrations and best practices for all forms of security and privacy for IoT and BD.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, visionaries, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
With five parallel tracks, more than 200 international speakers and experts, many Best Practice presentations and 120 hours of relevant content, EIC 2019 provides you with a comprehensive overview of future trends in Internet security as well as practical information about current projects.
Every year the agenda focuses on the latest and most relevant Information Security and Digital Identity topics to offer you the foundation to design the right digital identity and security strategies for your business. Hear about emerging trends in order to be prepared to meet and exceed present and future business, identity and security challenges.
This groundbreaking Summit is designed for senior security thought leaders working in Italy to help trigger productive discussions and promote best practices with the aim of putting together robust policies and standards that will shape a more secure future for Italian infrastructure and assets. The ItaliaSec summit is brought to you by Qatalyst Global.
Um gemeinsam Ideen zu entwickeln, voneinander zu lernen und neue Lösungsansätze für mehr IT-Sicherheit zu erarbeiten, bietet die SEKOP im bewährten FINAKI-Format eine in Deutschland einzigartige Plattform. CIOs, CISOs, CSOs, ISOs, IT-Sicherheitsverantwortliche, etc. namhafter Anwenderunternehmen aller Branchen treffen das Management führender Anbieter von IT-Sicherheitslösungen zum fachlich strategischen Diskurs. Ein Programmkomitee aus Vertretern der Anwenderunternehmen definiert das Programm sowie das Leitthema der Konferenz.
In Workshops werden aktuelle Themen und Problemstellungen diskutiert, Lösungsansätze erarbeitet und Best Practices abgeleitet. Die begleitende Fachmesse, Anwender-Business Cases und das Rahmenprogramm gewährleisten darüber hinaus genügend Raum für einen vertrauensvollen Austausch auf Augenhöhe sowie die Pflege des Netzwerks in angenehmer Atmosphäre.
Die Ergebnisse aller Workshops werden auf der InfoFair präsentiert und den Teilnehmern in einer Ergebnisdokumentation zur Verfügung gestellt, so dass sie jederzeit abgerufen und individuell weiterentwickelt werden können.
Eurocrypt 2019 is the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Eurocrypt is one of the three flagship conferences of the International Association for Cryptologic Research (IACR).
Electronic communication networks and interconnected digital services have become ubiquitous as they have permeated every fold of everyday life. At a time when automated profiling and electronic surveillance have become commodities, citizens and businesses alike may face limitations and threats when they have personal data processed or seek to protect their privacy on the internet or when using general communication services. Limitations in the transparency, the functionality and interconnectivity of online and communication services increases the risk of having personal data processed out of control of any accountable person or organization or simply becoming exposed to all sorts of privacy threats.
The recalibrated legal framework in the EU as manifested by the promulgation of the General Data Protection Regulation (GDPR), is key in an effort to better control the processing of personal data. Additionally, the forthcoming Regulation on Privacy and Electronic Communications is expected to give new impetus to the way privacy is protected in electronic communications. Even the best legislative efforts cannot keep up to speed with the pace of innovative technology and business models that challenge the way personal data is processed and privacy is protected across the EU and beyond; therefore, examining what is at stake and where threats thereto originate from becomes of paramount importance.
In the light of the above, ENISA, DG CONNECT, the University of Rome Tor Vergata and LUISS University are organizing the Annual Privacy Forum (APF) 2019.