Conferences related to Network Security

Back to Top

2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


2019 11th International Conference on Communication Systems & Networks (COMSNETS)

Comsnets is premier international conference dedicated to advances in networking and communications systems, and associated applications and services.

  • 2018 10th International Conference on Communication Systems & Networks (COMSNETS)

    COMSNETS is a premier international conference dedicated to advances in networking and communications systems, and associated applications and services.

  • 2017 9th International Conference on Communication Systems and Networks (COMSNETS)

    Next generation communications networks and associated applications and services

  • 2016 8th International Conference on Communication Systems and Networks (COMSNETS)

    Next generation communications networks and associated applications and services

  • 2015 7th International Conference on Communication Systems and Networks (COMSNETS)

    Internet Architecture, Protocols and Applications; Video Distribution; Network Operations andManagement; Broadband and Cellular Networks; Mesh, Sensor and PAN Networks;Communication Software; Wireless Operating Systems and Mobile Platforms; Peer-to-peerNetworking; Cognitive Radios and White Space Networking; Network Economics; NetworkOptimization; Optical Networks; Network Security & Cyber Security Technologies; Cloud andUtility computing; Storage Area Networks; Next Generation Web Architectures; VehicularNetworking; Energy-Efficient Networking; Network Science and Emergent Behavior in Socio-Technical Networks; Social Networking Analysis, Middleware and Applications; NetworkingTechnologies for Smart Energy Grids; Disruption/Delay Tolerant Networking; and StochasticModels of Communication Networks.

  • 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)

    Internet Architecture, Protocols and Applications; Video Distribution; Network Operations and Management; Broadband and Cellular Networks; Mesh, Sensor and PAN Networks; Communication Software; Wireless Operating Systems and Mobile Platforms; Peer-to-peer Networking; Cognitive Radios and White Space Networking; Network Economics; Network Optimization; Optical Networks; Network Security & Cyber Security Technologies; Cloud and Utility computing; Storage Area Networks; Next Generation Web Architectures; Vehicular Networking; Energy-Efficient Networking; Network Science and Emergent Behavior in Socio-Technical Networks; Social Networking Analysis, Middleware and Applications; Networking Technologies for Smart Energy Grids; Disruption/Delay Tolerant Networking; and Stochastic Models of Communication Networks.

  • 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)

    COMSNETS is a premier international conference dedicated to addressing advances in Networking and Communications Systems, and Telecommunications services. The goal of the conference is to create a world-class gathering of researchers from academia and industry, practitioners, business leaders, intellectual property experts, and venture capitalists, providing a forum for discussing cutting edge research, and directions for new innovative business and technology.

  • 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS)

    Internet Architecture, Protocols and Applications, Network Algorithms, Video Distribution (IPTV, Mobile Video, Video on Demand), Network Operations and Management, Broadband and Cellular Networks (3G/4G, WiMAX/LTE), Mesh, Sensor and PAN Networks, Communication Software (Cognitive Radios, DSA, SDR), Wireless Operating Systems and Mobile Platforms, Peer-to-peer Networking, Cognitive Radios and White Space Networking, Performance Analysis, Optical Networks, Cloud Computing, Security, Performance Modeling and Analysis.

  • 2011 Third International Conference on Communication Systems and Networks (COMSNETS)

    * Internet architecture and protocols * Network-based applications * Video Distribution (IPTV, Mobile video, Video on Demand) * Network Operations and Management * Local and Metro Area Networks, including Wireless * Broadband and Cellular Networks (3G/4G, WiMAX/LTE, UWB) * Mesh, Sensor and PAN Networks * Software in wireless communications (cognitive radios, dynamic spectrum access, SDR) * Wireless operating systems and mobile platforms

  • 2010 Second International Conference on COMmunication Systems and NETworkS (COMSNETS 2010)

    Internet architecture and protocols, Network-based applications, Video Distribution (IPTV, Mobile video, Video on Demand), Local and Metro Area Networks, Wireless Broadband and Cellular Networks, Mesh and Sensor Networks, Software in wireless communications, Wireless operating systems and mobile platforms, Optical Networks, Network Security, Cloud and Utility computing, Storage area networks, Next generation Web architectures, Vehicular Networking

  • 2009 First International Conference on COMmunication Systems and NETworkS (COMSNETS 2009)

    A premier international conference dedicated to addressing emerging topics and challenges in Networking and Communications Systems.


2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2019 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


More Conferences

Periodicals related to Network Security

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


More Periodicals

Most published Xplore authors for Network Security

Back to Top

Xplore Articles related to Network Security

Back to Top

An attack graph based network security evaluation model for hierarchical network

2010 IEEE International Conference on Information Theory and Information Security, 2010

To evaluate the security situation of hierarchical network, a novel evaluation algorithm based on the method of constructing a security risk function is proposed. The proposed algorithm is the aggregation of qualitative evaluation and quantitative evaluation. We quantify the asset loss (AL) and the threat value of each attack step (TVA) basing on attack graph, and adjust the loss of ...


IEEE Draft Standard for Ubiquitous Green Community Control Network: Security

IEEE P1888.3/D4.0, April 2013, 2013

This standard describes enhanced security management function forthe protocol defined in IEEE 1888 Ubiquitous Green Community ControlNetwork Protocol, specifies security requirements, defines system security architecture, gives a standardized description of authentication, authorization, along with security procedures and protocols. This standard can avoid unintended data disclosure to the public and unauthorized access to resources, while providing enhanced integrity and confidentiality of ...


IEEE Approved Draft Standard for Ubiquitous Green Community Control Network: Security

IEEE P1888.3/D6.0, July 2013, 2013

This standard describes enhanced security management function for the protocol defined in IEEE 1888 Ubiquitous Green Community Control Network Protocol, specifies security requirements, defines system security architecture, gives a standardized description of authentication, authorization, along with security procedures and protocols. This standard can avoid unintended data disclosure to the public and unauthorized access to resources, while providing enhanced integrity and ...


IEEE Draft Standard for Ubiquitous Green Community Control Network: Security

IEEE P1888.3/D5.0, June 2013, 2013

This standard describes enhanced security management function forthe protocol defined in IEEE 1888 Ubiquitous Green Community ControlNetwork Protocol, specifies security requirements, defines system security architecture, gives a standardized description of authentication, authorization, along with security procedures and protocols. This standard can avoid unintended data disclosure to the public and unauthorized access to resources, while providing enhanced integrity and confidentiality of ...


The Evaluation Model for Network Security

2014 Fourth International Conference on Communication Systems and Network Technologies, 2014

After analyzing and quantifying the network information security elements: confidentiality, integrity and availability, this paper defines the network security confidentiality vector, the network security integrity vector and the network security availability vector, and also builds the hierarchical indicator system of network security evaluation. Based on the positive and negative ideal comparison standards, the evaluation indicator elements are processed in the ...


More Xplore Articles

Educational Resources on Network Security

Back to Top

IEEE.tv Videos

Eric Vyncke: Internet of Things and Security: Different than Network Security? - WF-IoT 2015
NIKSUN World Wide Security & Mobility Conference 2011-D Raychaudhuri
Don't Get Hooked: Safe Strategies on the Net
Defense Machines: Towards Autonomous Network Security Systems - Aman Singh - ICRC 2018
Security for SDN/NFV and 5G Networks - Ashutosh Dutta - India Mobile Congress, 2018
Bill Woodward presents NEEDLES: 2016 End to End Trust and Security Workshop for the Internet of Things
Panelist Yuval Elovici - ETAP Forum Tel Aviv 2016
Regular Expression Matching with Memristor TCAMs - Cat Graves - ICRC 2018
802.1: Higher Layer LAN Protocols
IEEE Summit on Internet Governance 2014: Panel II - Security vs. Privacy
Transportation Electrification: The State of IEEE 802LAN MAN Standards in Vehicular Network
Panel Presentation: Yaniv Giat - ETAP Tel Aviv 2015
Deep Graph Learning: Techniques and Applications - Haifeng Chen - IEEE Sarnoff Symposium, 2019
Internet of Things Panelist - Jeffrey Voas: 2016 Technology Time Machine
Protecting Internet Traffic: Security Challenges and Solutions – IEEE Internet Initiative Webinar
Speaker XiaoDong Lee - ETAP San Jose 2015
Keynote: Wei Lu - ETAP Beijing 2016
George Oikonomou’s Paper: Traffic Forensics for IPv6-Based Wireless Sensor Networks and the IoT: WF-IoT 2016
Optical Stealth Communication based on Amplified Spontaneous Emission Noise - Ben Wu - IEEE Sarnoff Symposium, 2019
Reconfigurable Distributed MIMO for Physical-layer Security - Zygmunt Haas - IEEE Sarnoff Symposium, 2019

IEEE-USA E-Books

  • An attack graph based network security evaluation model for hierarchical network

    To evaluate the security situation of hierarchical network, a novel evaluation algorithm based on the method of constructing a security risk function is proposed. The proposed algorithm is the aggregation of qualitative evaluation and quantitative evaluation. We quantify the asset loss (AL) and the threat value of each attack step (TVA) basing on attack graph, and adjust the loss of assets that are of the same type and have different uses with coefficient of asset importance (CAI). Then, we construct a risk evaluation function which is based on the above three parameters. Thus, the assessment score gotten through the evaluation function can comprehensively reflect the risk value including loss, threat of an attack step, and importance of the suffering entity. Finally, we get the risk value by fusing all subnets' risk value in one area, and divide the risk value into 4 security levels. Seen from the case study, the model solves the security evaluation problem for hierarchical network simply and efficiently.

  • IEEE Draft Standard for Ubiquitous Green Community Control Network: Security

    This standard describes enhanced security management function forthe protocol defined in IEEE 1888 Ubiquitous Green Community ControlNetwork Protocol, specifies security requirements, defines system security architecture, gives a standardized description of authentication, authorization, along with security procedures and protocols. This standard can avoid unintended data disclosure to the public and unauthorized access to resources, while providing enhanced integrity and confidentiality of transmitted data in the ubiquitous green community control network.

  • IEEE Approved Draft Standard for Ubiquitous Green Community Control Network: Security

    This standard describes enhanced security management function for the protocol defined in IEEE 1888 Ubiquitous Green Community Control Network Protocol, specifies security requirements, defines system security architecture, gives a standardized description of authentication, authorization, along with security procedures and protocols. This standard can avoid unintended data disclosure to the public and unauthorized access to resources, while providing enhanced integrity and confidentiality of transmitted data in the ubiquitous green community control network.

  • IEEE Draft Standard for Ubiquitous Green Community Control Network: Security

    This standard describes enhanced security management function forthe protocol defined in IEEE 1888 Ubiquitous Green Community ControlNetwork Protocol, specifies security requirements, defines system security architecture, gives a standardized description of authentication, authorization, along with security procedures and protocols. This standard can avoid unintended data disclosure to the public and unauthorized access to resources, while providing enhanced integrity and confidentiality of transmitted data in the ubiquitous green community control network.

  • The Evaluation Model for Network Security

    After analyzing and quantifying the network information security elements: confidentiality, integrity and availability, this paper defines the network security confidentiality vector, the network security integrity vector and the network security availability vector, and also builds the hierarchical indicator system of network security evaluation. Based on the positive and negative ideal comparison standards, the evaluation indicator elements are processed in the dimensionless grey method, and a qualitative-quantitative evaluation model with multilayer linear weight for the network security is put forward. Finally, the feasibility and validity of the model are verified by analyzing some practical examples.

  • A study on attacker agent in virtual machine-based network security learning system

    Education of network security has attracted a lot of attentions due to increasing unauthorized access, lack of engineers who have network security skills, and so on. Although practice using actual computer networks is highly important for network security education, it requires costs to prepare a computer network for practice. We have proposed a network security learning system by constructing a virtual network on one PC so that low-cost, easy and safe practice can be accomplished. In this paper, we introduce an attacker agent that automatically attacks servers in a fixed pattern for supporting practical learning of defense techniques safely on a virtual network.

  • Dynamically validate network security based on adaptive control theory

    Network suffers from various types of security threats which are dynamic, and traditional static methods are difficult to effectively validate network security. A network security validation model based on adaptive control theory (NSVMAC) is proposed to validate network security in dynamic network environment. The Markov decision process is adopted to model the adaptive control of NSVMAC model, which is solved based on reinforcement learning method, and the adaptive optimization algorithm based on Q-Learning is proposed. The adaptability of NSVMAC model is analyzed in experiments, and confirms the effectiveness of the proposed method.

  • The network security situation predicting technology based on the small-world echo state network

    Network security model is a complex nonlinear system, and the network security situation value possesses the chaotic characters. The predictability of these situation values is of great significance for network security management. This paper proposes a novel prediction method, which is based on the echo state networks (ESNs) with small-world property. We can utilize this method to predict the network security situation after training and testing the acquired historical attack records. Verified by simulation results, the method has a higher prediction accuracy and speed compared with the conventional ESNs. Therefore it can reflect the network security situation in the future timely and accurately. We believe that this achievement will provide some practical guides for network administrators to supervise the network status.

  • Expert-Aware Approach: A New Approach to Improve Network Security Visualization Tool

    Nowadays, many computers have been infected with the computer anomalies or viruses. The availability of network security visualization tools greatly facilitate to detect, perceive and defend computer users from being affected by these anomalies. Many of the network security visualization tools are designed particularly for users with advanced network security awareness even though the tools are indispensable by various types of computer users. We proposed an expert-aware approach to designing a system which formulated with a large amount of network data or high-dimensional data and adaptive for different types of users. In the preliminary phase, we proposed and implemented initial pre-expertise classification system which provides a default setting for the expert-aware network security visualization tool. The tool will learn from continual user feedbacks in order to statistically satisfy the needs of majority tool users. The expert-aware approach looks at the users' expertise level in network security and adapts the visualization views that are best suitable for the user. Initial results of the implementation of the system show that it is capable of representing several of network security data not only on two-dimensional space on a computer but also beyond that space. Systems features, such as system effectiveness and efficiency of data visualization have been improved. Our experiments in a network lab suggest that the tool can be further improved as the tool for distribution to a wide range of computer user.

  • Quantitative models of imperfect deception in network security using signaling games with evidence [IEEE CNS 17 Poster]

    Deception plays a critical role in many interactions in communication and network security. Game-theoretic models called “cheap talk signaling games” capture the dynamic and information-asymmetric nature of deceptive interactions. But signaling games inherently model undetectable deception. In this paper, we investigate a model of signaling games in which the receiver can detect deception with some probability. This model nests traditional signaling games and complete information Stackelberg games as special cases. We present the pure strategy perfect Bayesian Nash equilibria of the game. Then we illustrate these analytical results with an application to active network defense. The presence of evidence forces majority-truthful behavior and eliminates some pure strategy equilibria. It always benefits the deceived player, but surprisingly sometimes also benefits the deceiving player.



Standards related to Network Security

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


IEEE Standard Specifications for Public-Key Cryptography

Specifications of common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys.


IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (key) derivation, public-key encryption, digital signatures, and identification, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.


More Standards

Jobs related to Network Security

Back to Top