Logo konference
Aktuality Program Poplatky Registrace Pořadatelé Partneři Pozvánka Ubytování Zpravodaj konferenceGalerie fotek z konference

Konference Bezpečnost a ochrana utajovaných skutečností 2005

Sborník příspěvků, anglicky (1,39 MB)

Případové studie partnerů konference (3,44 MB)

Informace o partnerech konference (1,70 MB)

Fotogalerie



Jednotlivá vystoupení

May 3, 2005
09:00 11:30 Mike Bond: Penetration (hacking) to Secure Hardware 
13:00 15:30 Ahmed Patel: Computer Forensics 
15:30 16:15 Albert Vajányi, Boris Zemek: Computer Forensics in Practise 
16:30 19:00 David Chadwick: Actual State of PKI 

May 4, 2005
09:009:45Mark S. Loepker: NATO Consultation, Command & Control Board INFOSEC Subcommittee "Protection of Information" SC/4 Perspectives 
10:0010:45Rolf von Roessing: Improving the IT Security Audit Framework: Standards, Common Ground, and Strategic Alignment
11:0011:45Jonas Gyllenhammar: Provision by Purpose - A Guide to Selecting SSL VPN Access Methods 
12:0013:00Geraint Price: Fault Tolerance and Security 
14:0014:20Marek Klonowski, Mirosław Kutyłowski, Bartek Różański: Privacy Protection for P2P Publish-Subscribe Networks 
14:2014:40Kyriakos Stefanidis, Dimitrios N. Serpanos: Packet-Marking Scheme for DDoS Attack Prevention 

May 5, 2005
8:008:45Bruno Crispo: Uniting Legislation with RFID Privacy - Enhancing Technologies
9:009:20Tomáš Rosa: Lattice-based Fault Attacks on DSA - Another Possible Strategy 
9:209:40Vlastimil Klíma: Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications 
9:4010:00Martin Kákona: Potential Risks for Smart Cards Firmware 
10:0010:20Michal Rapco: Security issues in wireless LANs 
10:4011:00Luděk Novák: Integrated Information Management Systems 
11:0011:20Pavel Štros: Discretionary security in class hierarchy based event management systems 
11:2011:40František Vosejpka: Practical IS security design in accordance with Common Criteria 
11:4012:00Martin Hlaváček, Tomáš Koníř: New Approach to Security Event Management 



Konference Bezpečnost a ochrana utajovaných skutečností 2003

Sborník příspěvků

Sborník příspěvků, anglicky (7,51 MB)

Případové studie partnerů konference (3,44 MB)



Jednotlivá vystoupení

28 April 2003
Invited speaker:
Eric Vyncke
Introduction and Security Perspective of Peer To Peer ProtocolsBelgium
Libor KratochvilSecure Splitting Block (SSB)Czech Republic
Martin KakonaExtending Security Functions for Windows NT/2000/XPCzech Republic
Kamil Golombek, Pavel KrecmerHacking vs. Pen-Testing. Experiences, Similarities and DifferencesCzech Republic
Invited speaker:
Arrigo Triulzi
Intrusion Detection Systems and IPv6Italy
 
29 April 2003
Introductory speech:
col. Jiří Baloun, PhD
Chief of Command and Control Division GS Czech Army and Security Director of the MoDCzech Republic
Invited speaker:
Del Pistoia
Protection of NATO Information and NATO CISItaly
Invited speaker:
Herbert Leitold
Austrian e-Government and Citizen Card InitiativesAustria
Petr Vanek, Jiri MrnustikAdvantages of Modular PKI for Implementation in Information SystemsCzech Republic
Invited speaker:
Stephen Farrell
X.509 and Attribute CertificatesThe Irish Republic
Jaroslav PinkavaTime Stamping AuthorityCzech Republic
Ryszard SzpyraMilitary Information OperationsPoland
Ludek Novak, Robert Gogela, Antonin SefcikCritical Infrastructure ModellingCzech Republic
Matus Mihalak, Ivan KocisAuthentication of Paper Printed Documents Using Paper CharacteristicsSlovakia
Pavel StrosUniform Approach to Mandatory Security of Event Management SystemsCzech Republic
Hanus AdlerSecurity Aspects of Homogeneous EnvironmentsCzech Republic
Frantisek VosejpkaEnforcement of NATO INFOSEC Requirements into Policy and Architecture of CISsCzech Republic
David C. HajicekElectronic Notary ServicesCzech Republic
Arturo Herrera ColmeneroUnification of Information security Policies Towards a NATO-wide Information Security SchemeCzech Republic
Petr SvedaEvaluating Trusted Electronic DocumentsCzech Republic
 
30 April 2003
Invited speaker:
Mike Bond
Differential Protocol Analysis and API-Level AttacksGreat Britain
Vlastimil Klima, Tomas RosaSide Channel Attacks on CBC Encrypted Messages in The PKCS#7 FormatCzech Republic
Josep Pegueroles, Francisco Rico-NovellaBalanced LKH for Secure Multicast with Optimal Key StorageSpain
Seung-Hyun Seo, Sang-Ho LeeNew Nominative Proxy Signature Scheme for Mobile CommunicationsKorea
Nol PremasathianA New Approach of Signing Documents with Symmetric Cryptosystems and an ArbitratorThailand
Ludek SmolikTrue Random Number Generation Using Quantum Mechanical EffectsGermany
Jiri Sobotik, Vaclav PlatenkaA Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic ApplicationsCzech Republic
Bohuslav RudolfWays of Doubling Block Size of Feistel Ciphers Used in Some Candidates for the AESCzech Republic
Karel Masarik, Daniel CvrcekSymmetric Key InfrastructureCzech Republic
Constantin Grozea, Dan Laurentiu GrecuApplications of Chaos Theory in Numerical Datastreams CryptographyRomania
Tomas Boucek, Jaroslav Dockal, Petr Dusek, Tomas KonirSecure Videoconferencing SystemCzech Republic



Konference Bezpečnost a ochrana utajovaných skutečností 2001

Sborník příspěvků

Sborník příspěvků, anglicky (3,32 MB)



Prezentace v PowerPointu

May 9. 2001

Tomasz Bilski
Poznań University of Technology, Poland
Some General Principles in Computer Security

Tomáš Rosa
Decros, Czech Republic
Future Cryptography: Standards Are Not Enough

Jaroslav Pinkava
Norman ASA, Czech Republic
Certification Authority in Praxis, Security Aspects

Eliška Ochodková, Václav Snášel
Technical University of Ostrava, Czech Republic
Using Quasigroups for Secure Encoding of File System

Luděk Smolík, Martin Drahanský
Secunet, Brno University of Technology, Czech Republic
Exploitation of Smart Cards and Human Biometrics Attributes

Miroslav Valeš
Veridicom, Czech Republic
Match On Card Technology and Its Use for PKI

Ladislav Huraj
Matthias Bel University, Banská Bystrica, Slovak Republic
Cascaded Signatures

ICZ - company presentation

AEC - company presentation (Czech version)

GRISOFT - company presentation

IBM - company presentation (Czech version)


May 10. 2001

National Security Authority, Czech Republic
The Protection of Classified Information

Brooks B. Chamberlin
US Army, United States of America
Information Security in Large-Scale Practice

Jindřich Kodl, Milan Lokay
Authorized expert in cryptology, Military Academy in Brno, Czech Republic
Human Identity, Human Identification and Human Security

Martin Hanzal
SODAT software, Czech Republic
Security of Information Systems - User's Attack Inside of Organization

Ján Matejka, Pavel Vondruška
Institute of State and Law of the Czech Academy of Sciences
Office for Personal Data Protection, Czech Republic
The Basic Terms and Legal Aspects of the ESA from the Practical and Security Points of View

Daniel Olejár
Comenius University, Bratislava, Slovak Republic
Electronic Signature - Selected Problems of The Electronic Signature Law and of Its Implementation

Daniel Cvrček
Brno University of Technology, Czech Republic
Real-World Problems of PKI Hierarchy

Petr Kučera
KOMIX, Czech Republic
Selective Data Encryption in Databases

Roger Allan French
Compaq Computer, United States of America
The Grand Goal: One Evaluation Per Planet

Luděk Novák
ISACA CRC, Czech Republic
Effective Design of Trusted Information Systems

Martin Másílko
ISACA CRC, Czech Republic
ISO 17799: The Standard For The Next Millennium

Pavel Štros
Datasys, Czech Republic
Security Impacts of Enterprise Management Software on Object Computer System

Marián Svetlík
Risk Analysis Consultants, Czech Republic
The National Security Profile of a Project for IT Risk Analysis and Management

EXPERT&PARTNER engineering - company presentation (Czech version)


May 11. 2001

Victor-Valeriu Patriciu, Aurel Serb
Military Technical Academy Bucharest, Romania
Deploying a Certification Authority for Networks Security

Petr Hanáček
Brno University of Technology, Czech Republic
Public Key Certification Infrastructure

Ivan Svoboda
T-SOFT, Czech Republic
Deployment of IPSec Virtual Private Network Solutions

Josef Pojsl, Martin Macháček
Trusted Network Solutions, Czech Republic
Network Perimeter Defense

Aurel Serb, Victor-Valeriu Patriciu
Military Technical Academy Bucharest, Romania
Improvement of Computer Networks Security by Using Fault Tolerant Clusters

Howard A. Schmidt
Microsoft Corporation, United States of America
Security and Microsoft

Bohuslav Šámal
Altron, Czech Republic
Computer Network Safety - It Is Also Power Supply Safety

VUMS Datacom - company presentation