Conferences related to Cryptographic protocols

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


2020 International Symposium on Information Theory and Its Applications (ISITA)

The scope of the symposium includes all aspects of information theory and its applications. Itcovers a wide range of topics such as Shannon Theory, Coding Theory, and InformationSecurity as well as novel applications of information theory.

  • 2018 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.

  • 2016 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.

  • 2014 International Symposium on Information Theory and its Applications (ISITA)

    The ISITA symposium features world-class speakers, plenary talks and technical sessions on a diverse range of topics within the field of information theory Interested authors are invited to submit papers describing novel and previously unpublished results on topics in information theory and its applications, including, but not limited to: Error Control Coding, Coded Modulation, Communication Systems, Detection and EstimationSpread Spectrum Systems, Signal Processing, Rate-Distortion Theory, Stochastic Processes, Network Coding, Shannon Theory, Coding Theory and Practice, Data Compression and Source Coding, Data Storage, Mobile Communications, Pattern Recognition and Learning, Speech/Image Coding, Multi-Terminal Information Theory, Cryptography and Data Security, Applications of Information Theory, and Quantum Information Theory.

  • 2012 International Symposium on Information Theory and its Applications (ISITA)

    The scope of this symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Cryptology as well as novel applications of Information Theory.

  • 2010 International Symposium On Information Theory & Its Applications (Isita2010)

    The topics of interest include Error Control Coding, Coding Theory and Practice, Coded Modulation, Data Compression and Source Coding, Pattern Recognition and Learning, Speech/Image Coding, Rate-Distortion Theory, Shannon Theory, Stochastic Processes, Cryptology and Data Security, Data Networks, Multi-User Information Theory, Quantum Information Processing

  • 2008 International Symposium on Information Theory and its Applications (ISITA)

    The scope is Information theory and its Applications, e.g., error control coding, Coded Modulation, Cummunication systems, Detection and estimation, Spread spectrum systems, Signal processing, Rate-distortion theory, Stochastic processes, Data networks, Multi-user information theory, Coding theory and Practice, Data compression and Source coding, Optical communications, Mobile communications, Pattern recognition and learning, Speech/Image Coding, Shannon Theory, Cryptograph and Data Securi


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


More Conferences

Periodicals related to Cryptographic protocols

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


More Periodicals

Most published Xplore authors for Cryptographic protocols

Back to Top

Xplore Articles related to Cryptographic protocols

Back to Top

Security analysis and configuration of SSL protocol

2008 2nd International Conference on Anti-counterfeiting, Security and Identification, 2008

SSL (secure sockets layer) protocol is one of key technologies to keep userpsilas data in secure transmission via Internet. This paper is present to analyze the security of SSL protocol and propose a new scheme of SSL protocol configured in the Linux operating system (OS). The experimental results show that the proposed scheme is feasible and practical as a secure ...


A Trusted Transfer Protocol Based on Property-Based Seal

2008 International Conference on Computer Science and Software Engineering, 2008

Improperly managed private keys and improperly configured endpoints could result in loss of security in traditional way of message exchange. Whereas some mechanisms obtained from the new PC architecture of trusted platforms, such as seal, have exact features to deal with those deficiencies. So adopting the property-based sealing function proposed by some literates and some cryptography schemes, we put forward ...


The Security Requirement for off-line E-cash system based on IC Card

11th International Conference on Parallel and Distributed Systems (ICPADS'05), 2005

An offline E-cash system is presented that offers appreciably greater security and better privacy than currently considered E-cash system with similar functionality. Most off-line E-cash systems use the temper-resistant IC card which controls an E-cash issued by the card issuer. Offline E-cash system based on IC card has the threats of overspending, double spending, forgery E-cash, altering/eavesdropping transaction contents, etc. ...


Improved Yahalom protocol analysis theory based on ideal and honest

2010 International Conference On Computer Design and Applications, 2010

With people become increasingly dependent on computer networks, people on the requirements of security protocols, which has been realized from the initial establishment of effective communication links to provide safe and reliable communications services now. The correctness of security protocols is very important to the Network Security. There are many security flaws and loopholes in the agreement, not because of ...


The Modeling Analysis of Cryptographic Protocols using Promela

2006 6th World Congress on Intelligent Control and Automation, 2006

The analysis and verification of security protocols is an important field in the security of computer nowadays. Model checking technique to the analysis of security protocols has proved remarkably successful, which involves three parts: modeling of system behaviors, description of system properties and system verification. Modeling of system behaviors is a highly challenging task because of its complexity, especially modeling ...


More Xplore Articles

Educational Resources on Cryptographic protocols

Back to Top

IEEE-USA E-Books

  • Security analysis and configuration of SSL protocol

    SSL (secure sockets layer) protocol is one of key technologies to keep userpsilas data in secure transmission via Internet. This paper is present to analyze the security of SSL protocol and propose a new scheme of SSL protocol configured in the Linux operating system (OS). The experimental results show that the proposed scheme is feasible and practical as a secure solution for Web-based communication, and the SSL protocol is compatible to the other protocol in application layer via proper configuration.

  • A Trusted Transfer Protocol Based on Property-Based Seal

    Improperly managed private keys and improperly configured endpoints could result in loss of security in traditional way of message exchange. Whereas some mechanisms obtained from the new PC architecture of trusted platforms, such as seal, have exact features to deal with those deficiencies. So adopting the property-based sealing function proposed by some literates and some cryptography schemes, we put forward a trusted transfer model and initiate a secure provably transfer protocol. This protocol not only enhances the data security during transmission, but also ensures data security in storage.

  • The Security Requirement for off-line E-cash system based on IC Card

    An offline E-cash system is presented that offers appreciably greater security and better privacy than currently considered E-cash system with similar functionality. Most off-line E-cash systems use the temper-resistant IC card which controls an E-cash issued by the card issuer. Offline E-cash system based on IC card has the threats of overspending, double spending, forgery E-cash, altering/eavesdropping transaction contents, etc. To prevent the above threats, there have been a lot of technical discussions of the security requirements for theoretical offline E-cash protocols based on IC card. However, there has been little attention paid to the security requirements for practical offline E-cash system based on IC card including entity authentication, key management, implementation of cryptographic algorithm, etc. Thus, this paper describes the security requirements for cryptographic algorithms, integrity for implementation of cryptographic algorithm, authentication module, key management, and E-cash protocols

  • Improved Yahalom protocol analysis theory based on ideal and honest

    With people become increasingly dependent on computer networks, people on the requirements of security protocols, which has been realized from the initial establishment of effective communication links to provide safe and reliable communications services now. The correctness of security protocols is very important to the Network Security. There are many security flaws and loopholes in the agreement, not because of the agreement resulting from the use of cryptographic algorithms, but caused by its own structure by the agreement. In this paper, the strand space model Yahalom protocol security for a more detailed analysis and algebra for the existence of defects Yahalom protocol proposes an improved scheme. Analysis indicates that the improvement program to meet the corresponding authentication protocol and confidentiality requirements.

  • The Modeling Analysis of Cryptographic Protocols using Promela

    The analysis and verification of security protocols is an important field in the security of computer nowadays. Model checking technique to the analysis of security protocols has proved remarkably successful, which involves three parts: modeling of system behaviors, description of system properties and system verification. Modeling of system behaviors is a highly challenging task because of its complexity, especially modeling of intruder capability. A general method is proposed to construct a Promela model of the cryptographic protocol, and make use of this way to model the Helsinki protocol. The Promela model of Helsinki protocol is automatically verified by model checker Spin and an attack to Helsinki protocol has successfully been found. Experimental result shows the verification validity via message sequence chart. The general method may become a good guideline for verifying similar cryptographic protocols

  • Quantum communications

    Summary form only given. Quantum mechanics allows a number of communications protocols that would not be possible classically, including provably-secure messages (quantum cryptography), increased channel capacity, and the ability to transmit an unknown quantum state (quantum teleportation). Practical systems for quantum cryptography have now been demonstrated by a number of groups. I will begin by reviewing the most commonly-used methods for quantum cryptography, including the advantages and disadvantages of each in practical applications. The maximum range of current quantum cryptography systems is limited by the fact that optical amplifiers would destroy the quantum coherence of single photons and cannot be used in these kinds of systems. One potential solution to this problem is the transmission of single photons in free space, which would allow a global system for quantum cryptography based on a network of satellites and ground stations. Free-space quantum cryptography systems of that kind have now been demonstrated over relatively short distances. The range of quantum cryptography systems in optical fibers can also be extended using quantum repeaters that make use of entanglement swapping, entanglement purification, and quantum teleportation. These same techniques could also be used to implement a "quantum Internet" for the transmission of qubits from one quantum computer to another. The practical challenges that will have to be met in order to implement quantum repeaters and quantum teleportation over large distances will be discussed.

  • High-level specification of security systems

    In order to study the security systems, we have developed a methodology for the application to the analysis of cryptographic protocols of the formal analysis techniques commonly used in communication protocols. In particular, we have extended the design and analysis phases with security properties. Our proposal uses a specification notation based on HMSC/MSC, which can be automatically translated into a generic SDL specification.

  • A technical comparison of IPSec and SSL

    IPSec (IP security) and SSL (secure socket layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL have advantages and shortcomings. Yet no paper has been found comparing the two protocols in terms of characteristic and functionality. Our objective is to present an analysis of security and performance properties for IPSec and SSL.

  • Simulation of quantum-cryptographic B92 protocol in the plug and play system

    We performed a simulation of the quantum cryptographic B92 protocol, using coherent continuum states, in the plug and play system. We observed fluctuations of the mean photon number in the pulses that arrive at the receiver, introduced by the statistical property of the simulation. This fluctuation simulates the presence of a classical noise source in the system that occurs in practical systems.

  • Complexity and fast algorithms for multiexponentiations

    In this paper, we propose new algorithms for multiple modular exponentiation operations. The major aim of these algorithms is to speed up the performance of some cryptographic protocols based on multiexponentiation. Our new algorithms are based on binary-like complex arithmetic, introduced by K. Pekmestzi (1989) and generalized in this paper.



Standards related to Cryptographic protocols

Back to Top

IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications

The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...



Jobs related to Cryptographic protocols

Back to Top