Research results are valuable and also of interest to data thieves. The scientific community, which wants to keep its networks and systems openly available, is fighting back - with information security strategies. The 32nd ‘Security in Networked Systems’ conference of the DFN-Verein will take place on 11 and 12 February. Security experts will meet at the Grand Elysée Hotel Hamburg to discuss technologies and measures to secure data and information for open science. Registration is open until 28 January: https://lnkd.in/dBz4AujD #ITsecurity #cybersecurity Gauss Centre for Supercomputing, GÉANT, Open Science Tools, OpenScience, Association "Open Science", EuroHPC Joint Undertaking (EuroHPC JU)
Leibniz Supercomputing Centre ’s Post
More Relevant Posts
-
🙌 Journal of Surveillance, Security and Safety (JSSS) #SpecialIssue #CallforPapers 📚 Topic: Key Management and Key Recovery. 🔍 Guest Editors: Prof. Moti Yung (Columbia University & Google LLC) Prof. Josef Pieprzyk (CSIRO & Polish Academy of Sciences) This issue explores key aspects of cryptographic key generation, management, and recovery in both classical and quantum environments. We invite all researchers in this field to contribute their original work and extend the conversation on this crucial topic. 📚 7 published articles from this special issue are available for free access and can be read and downloaded here: https://lnkd.in/ga4d5Ydz 💡 Upcoming Article: Cloud-Edge-End Based Key Management for Decentralized Applications by Futai Zhang and Jie Zhang– Stay tuned for its release! We look forward to your contributions. Join us to discuss this topic together with many outstanding experts. 🗓️ Submission Deadline: December 31, 2024 🔗 For submission guidelines and to submit your paper: https://lnkd.in/gaPKRhcj #KeyManagement #Cryptography #QuantumComputing #Cybersecurity #ResearchCall #JSSS
To view or add a comment, sign in
-
-
🔬 Field Day for our Cryptographs 🔬 Last Monday, Dayane Horkos and Elouan Gros had the chance to take part in the first day of the "𝘁𝗵𝗲 𝗙𝗿𝗲𝗻𝗰𝗵 𝗡𝗮𝘁𝗶𝗼𝗻𝗮𝗹 𝗗𝗮𝘆𝘀 𝟮𝟬𝟮𝟰 𝗼𝗳 𝘁𝗵𝗲 𝗖𝗼𝗺𝗽𝘂𝘁𝗲𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗚𝗗𝗥" in Rennes, France. They attended to two plenary talks: the first by Hamed Haddadi, titled "𝗦𝗲𝗰𝘂𝗿𝗶𝗻𝗴 𝘁𝗵𝗲 𝗡𝗲𝘅𝘁 𝗕𝗶𝗹𝗹𝗶𝗼𝗻 𝗗𝗲𝘃𝗶𝗰𝗲𝘀 𝗮𝘁 𝘁𝗵𝗲 𝗘𝗱𝗴𝗲", raised the question: Who are we building privacy tech for? The second by Cas Cremers, titled "𝗧𝗵𝗲 𝗙𝘂𝘁𝘂𝗿𝗲 𝗼𝗳 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗣𝗿𝗼𝘁𝗼𝗰𝗼𝗹 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀: 𝗧𝗼𝘄𝗮𝗿𝗱𝘀 𝗣𝗿𝗼𝘃𝗮𝗯𝗹𝗲 𝗚𝘂𝗮𝗿𝗮𝗻𝘁𝗲𝗲𝘀 𝗳𝗼𝗿 𝗔𝗽𝗽𝘀?" emphasized the importance of formal proofs of security and of communication between researchers and engineers. In the afternoon, they attended the GT C2-SSM (cc CNRS - Centre national de la recherche scientifique) talks where new and interesting cryptography topics were presented by Clémence Bouvier, Benjamin Smith, Cyrille CHAVET and Simon Pontié. During the breaks between presentations, they met and exchanged ideas with fellow cybersecurity professionals and academics. (Olivier Levillain - Mohamed EL BOUAZZATI - Justine Paillet) #SurvivalPlan #BusinessContinuity #SurvivalKits #Resilience #CyberSecurity #Astran #Resilience #Ransomware
To view or add a comment, sign in
-
-
"Security Proof of Single-Source Shortest Distance Protocols Built on Secure Multiparty Computation Protocols" We're excited to present groundbreaking work on Secure Secret-Sharing Single-Source Shortest Distance (SSSD) protocols, based on secure multiparty computation (SMC). 🌐✨ While previous research showcased the efficiency of these protocols on large-scale graphs, formal security proofs had remained unexplored—until now. This paper bridges that gap with the first-ever security proof for SSSD protocols, using privacy-preserving Bellman–Ford algorithms. 🔑 Key Contributions: ✅ Rigorous security proofs, ensuring robustness and reliability. ✅ Exploration of adversarial models, security definitions, and cryptographic assumptions. ✅ Enhanced efficiency through parallel computation, demonstrated on large-scale graphs. ✅ Comprehensive performance comparisons with existing methods. by Mohammad Anagreh and Peeter Laud 🔗 Read the full paper here: https://lnkd.in/gjXmiMUn #Cybersecurity #SecureComputing #SSSD
To view or add a comment, sign in
-
-
Coeus Institute's GERA, autonomously identified one of the most impactful News of the day under 'Nation State Hacking' category. GERA's Innovative Rating algorithm RATED this event ("Feds Warn on Russian Actors Targeting Critical Infrastructure") with a score of 1202.46. GERA's patented rating algorithm automatically identifies critical events, categorizes /classifies them, finds root-causes, discovers correlations, and predicts future events.
To view or add a comment, sign in
-
The SafeHorizon Project EU project has officially launched! 🚀 Coordinated by the Athena Research Center, this three-year EU-funded initiative is set to run from September 2024 to August 2027. During the kick-off meeting in Athens, 13 international partners and over 30 representatives from law enforcement agencies, research centers, and businesses came together to align on the project’s ambitious goals. 🌍🤝 SafeHorizon Project EU project tackles the growing challenge of Crime-as-a-Service (CaaS) by integrating data from the clear web, deep web, dark web, and law enforcement sources with cutting-edge machine learning tools. This approach will provide European LEAs, CERTs, and CSIRTs with actionable intelligence and an easy-to-use toolkit to fight organized cybercrime effectively. 🔍💡 Stay tuned for more updates as we work together to create a safer digital future! #SAFEHORIZON #CyberSecurity #HorizonEU #CaaS #Innovation #LEA #MachineLearning #Cybercrime #EUProjects #DigitalSafety Athena Research Center Vicomtech DataCentric Center for Security Studies (KEMEA) CSIC Privanova Tampere University Delft University of Technology Cyber Intelligence House Scorechain
To view or add a comment, sign in
-
-
This paper surveys current literature on #vehicle-#to-#everything (#V2X) security and provides a systematic and comprehensive review of the most relevant security enhancements to date. An in-depth classification of V2X attacks is first performed according to key security and privacy requirements. Their methodology resumes with a taxonomy of security mechanisms based on their proactive/reactive defensive approach, which helps identify strengths and limitations of state-of-the-art countermeasures for V2X attacks. In addition, this paper delves into the potential of emerging security approaches leveraging artificial intelligence tools to meet security objectives. Promising data-driven solutions tailored to tackle security, privacy and trust issues are thoroughly discussed along with new threat vectors introduced inevitably by these enablers. The lessons learned from the detailed review of existing works are also compiled and highlighted. The authors conclude this survey with a structured synthesis of open challenges and future research directions to foster contributions in this prominent field. ---- Roshan Sedar, Charalampos Kalalas, Francisco Vazquez Gallego, Luis Alonso, Jesus Alonso-Zarate, PhD More details can be found at this link: https://lnkd.in/ekmGtyVC
A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths
ieeexplore.ieee.org
To view or add a comment, sign in
-
Are you ready for quantum? Join DigiCert September 26 for World #QuantumReadinessDay, a global event dedicated to building and implementing protections against quantum threats. RSVP now to make sure that when quantum comes, your organization is ready ⬇️
To view or add a comment, sign in
-
Are you ready for quantum? Join DigiCert September 26 for World #QuantumReadinessDay, a global event dedicated to building and implementing protections against quantum threats. RSVP now to make sure that when quantum comes, your organization is ready ⬇️
To view or add a comment, sign in
-
Our #cybersecurity faculty were well represented at last week's National Science Foundation (NSF) Secure and Trustworthy Cyberspace research conference, presenting 8 posters and leading panels. Chair Matthew Wright led a session on "Preventing Disinformation and Deepfakes,” while professors from multiple departments at Rochester Institute of Technology presented their work on an array of cybersecurity topics. Learn more: https://lnkd.in/eW2g6tmd Ivan De Oliveira Nunes, Hanif Rahbari, Yidan Hu, Weijie Zhao, Arthur Azevedo de Amorim, Daqing Hou, Michael Zuzak #deepfakes #quantumcomputing #cryptography
To view or add a comment, sign in
-
CryptoNext Security will take part in "Innovations and Cybersecurity for Space Systems: The Current Status and Future Outlook," an event organized by the Expert Groups of the National Center for Space Studies (les Communautés d’Experts (COMET) du @Centre National d’Etudes Spatiales (CNES) which will take place in Toulouse on Thursday, December 19. 🛡️🛰️ This conference will provide an overview of the synergies between #cybersecurity and #space while highlighting recent advancements in the field of research and technology. 🎤 The CryptoNext Security session will begin at 11:10 and will be led by René Martin who will address the topic, "What impact can post-quantum cryptography have on restricted equipment?" The discussion will address the hardware, network and regulatory issues involved in deploying #PQC (Post-Quantum Cryptography). 👉 This can't-miss event will put the spotlight on the challenges and opportunities of tomorrow's space cybersecurity. Learn more here: https://lnkd.in/euFnmQYQ Photo by Pixabay
To view or add a comment, sign in
-