Konference Bezpečnost a ochrana utajovaných skutečností 2005
Sborník příspěvků, anglicky (1,39 MB)
Případové studie partnerů konference (3,44 MB)
Informace o partnerech konference (1,70 MB)
Fotogalerie
Jednotlivá vystoupení
May 3, 2005 |
09:00 |
11:30 |
Mike Bond: Penetration (hacking) to Secure Hardware  |
13:00 |
15:30 |
Ahmed Patel: Computer Forensics  |
15:30 |
16:15 |
Albert Vajányi, Boris Zemek: Computer Forensics in Practise  |
16:30 |
19:00 |
David Chadwick: Actual State of PKI  |
May 4, 2005 |
09:00 | 9:45 | Mark S. Loepker: NATO Consultation, Command & Control Board INFOSEC Subcommittee "Protection of Information" SC/4 Perspectives  |
10:00 | 10:45 | Rolf von Roessing: Improving the IT Security Audit Framework: Standards, Common Ground, and Strategic Alignment |
11:00 | 11:45 | Jonas Gyllenhammar: Provision by Purpose - A Guide to Selecting SSL VPN Access Methods  |
12:00 | 13:00 | Geraint Price: Fault Tolerance and Security  |
14:00 | 14:20 | Marek Klonowski, Mirosław Kutyłowski, Bartek Różański: Privacy Protection for P2P Publish-Subscribe Networks  |
14:20 | 14:40 | Kyriakos Stefanidis, Dimitrios N. Serpanos: Packet-Marking Scheme for DDoS Attack Prevention  |
May 5, 2005 |
8:00 | 8:45 | Bruno Crispo: Uniting Legislation with RFID Privacy - Enhancing Technologies |
9:00 | 9:20 | Tomáš Rosa: Lattice-based Fault Attacks on DSA - Another Possible Strategy  |
9:20 | 9:40 | Vlastimil Klíma: Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications  |
9:40 | 10:00 | Martin Kákona: Potential Risks for Smart Cards Firmware  |
10:00 | 10:20 | Michal Rapco: Security issues in wireless LANs  |
10:40 | 11:00 | Luděk Novák: Integrated Information Management Systems  |
11:00 | 11:20 | Pavel Štros: Discretionary security in class hierarchy based event management systems  |
11:20 | 11:40 | František Vosejpka: Practical IS security design in accordance with Common Criteria  |
11:40 | 12:00 | Martin Hlaváček, Tomáš Koníř: New Approach to Security Event Management  |
Konference Bezpečnost a ochrana utajovaných skutečností 2003
Sborník příspěvků
Sborník příspěvků, anglicky (7,51 MB)
Případové studie partnerů konference (3,44 MB)
Jednotlivá vystoupení
28 April 2003 |
Invited speaker: Eric Vyncke | Introduction and Security Perspective of Peer To Peer Protocols | Belgium |
Libor Kratochvil | Secure Splitting Block (SSB) | Czech Republic |
Martin Kakona | Extending Security Functions for Windows NT/2000/XP | Czech Republic |
Kamil Golombek, Pavel Krecmer | Hacking vs. Pen-Testing. Experiences, Similarities and Differences | Czech Republic |
Invited speaker: Arrigo Triulzi | Intrusion Detection Systems and IPv6 | Italy |
|
29 April 2003 |
Introductory speech: col. Jiří Baloun, PhD | Chief of Command and Control Division GS Czech Army and Security Director of
the MoD | Czech Republic |
Invited speaker: Del Pistoia | Protection of NATO Information and NATO CIS | Italy |
Invited speaker: Herbert Leitold | Austrian e-Government and Citizen Card Initiatives | Austria |
Petr Vanek, Jiri Mrnustik | Advantages of Modular PKI for Implementation in Information Systems | Czech Republic |
Invited speaker: Stephen Farrell | X.509 and Attribute Certificates | The Irish Republic |
Jaroslav Pinkava | Time Stamping Authority | Czech Republic |
Ryszard Szpyra | Military Information Operations | Poland |
Ludek Novak, Robert Gogela, Antonin Sefcik | Critical Infrastructure Modelling | Czech Republic |
Matus Mihalak, Ivan Kocis | Authentication of Paper Printed Documents Using Paper Characteristics | Slovakia |
Pavel Stros | Uniform Approach to Mandatory Security of Event Management Systems | Czech Republic |
Hanus Adler | Security Aspects of Homogeneous Environments | Czech Republic |
Frantisek Vosejpka | Enforcement of NATO INFOSEC Requirements into Policy and Architecture of CISs | Czech Republic |
David C. Hajicek | Electronic Notary Services | Czech Republic |
Arturo Herrera Colmenero | Unification of Information security Policies Towards a NATO-wide Information Security Scheme | Czech Republic |
Petr Sveda | Evaluating Trusted Electronic Documents | Czech Republic |
|
30 April 2003 |
Invited speaker: Mike Bond | Differential Protocol Analysis and API-Level Attacks | Great Britain |
Vlastimil Klima, Tomas Rosa | Side Channel Attacks on CBC Encrypted Messages in The PKCS#7 Format | Czech Republic |
Josep Pegueroles, Francisco Rico-Novella | Balanced LKH for Secure Multicast with Optimal Key Storage | Spain |
Seung-Hyun Seo, Sang-Ho Lee | New Nominative Proxy Signature Scheme for Mobile Communications | Korea |
Nol Premasathian | A New Approach of Signing Documents with Symmetric Cryptosystems and an Arbitrator | Thailand |
Ludek Smolik | True Random Number Generation Using Quantum Mechanical Effects | Germany |
Jiri Sobotik, Vaclav Platenka | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications | Czech Republic |
Bohuslav Rudolf | Ways of Doubling Block Size of Feistel Ciphers Used in Some Candidates for the AES | Czech Republic |
Karel Masarik, Daniel Cvrcek | Symmetric Key Infrastructure | Czech Republic |
Constantin Grozea, Dan Laurentiu Grecu | Applications of Chaos Theory in Numerical Datastreams Cryptography | Romania |
Tomas Boucek, Jaroslav Dockal, Petr Dusek, Tomas Konir | Secure Videoconferencing System | Czech Republic |
Konference Bezpečnost a ochrana utajovaných skutečností 2001
Sborník příspěvků
Sborník příspěvků, anglicky (3,32 MB)
Prezentace v PowerPointu
May 9. 2001
Tomasz Bilski
Poznań University of Technology, Poland
Some General Principles in Computer Security
Tomáš Rosa
Decros, Czech Republic
Future Cryptography: Standards Are Not Enough
Jaroslav Pinkava
Norman ASA, Czech Republic
Certification Authority in Praxis, Security Aspects
Eliška Ochodková, Václav Snášel
Technical University of Ostrava, Czech Republic
Using Quasigroups for Secure Encoding of File System
Luděk Smolík, Martin Drahanský
Secunet, Brno University of Technology, Czech Republic
Exploitation of Smart Cards and Human Biometrics Attributes
Miroslav Valeš
Veridicom, Czech Republic
Match On Card Technology and Its Use for PKI
Ladislav Huraj
Matthias Bel University, Banská Bystrica, Slovak Republic
Cascaded Signatures
ICZ - company presentation
AEC - company presentation (Czech version)
GRISOFT - company presentation
IBM - company presentation (Czech version)
May 10. 2001
National Security Authority, Czech Republic
The Protection of Classified Information
Brooks B. Chamberlin
US Army, United States of America
Information Security in Large-Scale Practice
Jindřich Kodl, Milan Lokay
Authorized expert in cryptology, Military Academy in Brno, Czech Republic
Human Identity, Human Identification and Human Security
Martin Hanzal
SODAT software, Czech Republic
Security of Information Systems - User's Attack Inside of Organization
Ján Matejka, Pavel Vondruška
Institute of State and Law of the Czech Academy of Sciences
Office for Personal Data Protection, Czech Republic
The Basic Terms and Legal Aspects of the ESA from the Practical and Security Points of View
Daniel Olejár
Comenius University, Bratislava, Slovak Republic
Electronic Signature - Selected Problems of The Electronic Signature Law and of Its Implementation
Daniel Cvrček
Brno University of Technology, Czech Republic
Real-World Problems of PKI Hierarchy
Petr Kučera
KOMIX, Czech Republic
Selective Data Encryption in Databases
Roger Allan French
Compaq Computer, United States of America
The Grand Goal: One Evaluation Per Planet
Luděk Novák
ISACA CRC, Czech Republic
Effective Design of Trusted Information Systems
Martin Másílko
ISACA CRC, Czech Republic
ISO 17799: The Standard For The Next Millennium
Pavel Štros
Datasys, Czech Republic
Security Impacts of Enterprise Management Software on Object Computer System
Marián Svetlík
Risk Analysis Consultants, Czech Republic
The National Security Profile of a Project for IT Risk Analysis and Management
EXPERT&PARTNER engineering - company presentation (Czech version)
May 11. 2001
Victor-Valeriu Patriciu, Aurel Serb
Military Technical Academy Bucharest, Romania
Deploying a Certification Authority for Networks Security
Petr Hanáček
Brno University of Technology, Czech Republic
Public Key Certification Infrastructure
Ivan Svoboda
T-SOFT, Czech Republic
Deployment of IPSec Virtual Private Network Solutions
Josef Pojsl, Martin Macháček
Trusted Network Solutions, Czech Republic
Network Perimeter Defense
Aurel Serb, Victor-Valeriu Patriciu
Military Technical Academy Bucharest, Romania
Improvement of Computer Networks Security by Using Fault Tolerant Clusters
Howard A. Schmidt
Microsoft Corporation, United States of America
Security and Microsoft
Bohuslav Šámal
Altron, Czech Republic
Computer Network Safety - It Is Also Power Supply Safety
VUMS Datacom - company presentation
|