ICT Conference 2019
  • HOME
  • Speakers
  • Agenda
  • Sponsorship
  • About
    • Contact
    • Gallery
    • Conferences >
      • PARTICIPANTS AT THE PREVIOUS ​ICT SECURITY CONFERENCES
      • THIRD ICT SECURITY CONFERENCE >
        • Presentations
        • Agenda.pdf
        • Lectures >
          • IT Audit, Risks, Security
          • Internet Security Threat Report
          • Cyber Security And Cyber Crime
          • ATM Security
          • ​Enhancing Security of Electronic Payments - Decision IQ
          • Security in Smart metering - Smart Grid
          • Cloud Based NFC Mobile Payments - Security Risks and Protection Measures
          • How to Protect Confidential Information?
          • Implementation of „SSL for ado.net“ for Encryption of the Data in Transit in the Corporate Network
          • Linux, Open Source and Security
          • Anatomy of a Social Engineering Attack
          • Endpoint Protection, New Technologies That Are Replacing/Complementing Traditional Antivirus
          • App Centric Computing - Impact on Your IT
          • Tor Network - How to Achieve Anonymity?
          • Secure Printing
          • Microsoft Advanced Threat Analytics
          • Creating WiFi NSA station
          • The Safety of Cryptography
          • The Problem of Protecting Security of Persons and Property in Light of Development of Internet of Things
        • Speakers >
          • Ph.D. Zoran Jovanovic
          • Slobodan Nedeljkovic
          • Nebojsa Cvijetic
          • Davor Kodrnja
          • Filip Bojovic
          • Ivan Dragas
          • Ivan Stijovic
          • Krzysztof Graczek
          • Nenad Andrejevic
          • Bojan Pavlovic
          • Luka Milinkovic
          • Darko Mihajlovski
          • Srdjan Popovic
          • Jovan Sikanja
          • Vladimir Vucinic
          • Bojan Milovanovic
          • Ph.D. Zoran Cica
          • Dragan Petrovic
          • Mirad Maglic
          • Milan Gabor
          • Ph.D. Zarko Stanisavljevic
          • Ph.D. Dragan Djurdjevic
          • Filip Simeonov
          • Mane Piperevski
        • Workshops >
          • What Code Come In Must Come Out - Threats at iOS and Android Applications
          • Hacking Attacks - The Power of IPv6 Driven Malware
      • Second ICT Security Conference >
        • Luka Milinkovic1
        • Viktor Kanizai
        • Viktor Varga - Saga
        • Dejan Spasic
        • Halkbank
        • Ivan Dragas
        • Piperevski
        • Zakljucak konferencije 2015
        • Zbornik radova
        • Halcom i svecano otvaranje
      • First ICT Security Conference
      • FOURTH ICT SECURITY CONFERENCE >
        • Lecturers
        • Speakers
        • Video
        • Sponsors
      • Blog

ICT SECURITY 2016

​The safety of cryptography

The Safety of Cryptography

​
There are many aspects of modern technologies that are transparently applied and should make us feel safe in our everyday use of Internet. Many users do not feel threatened, since they consider their data to be unimportant to others. But what about account hijacking, ransomware, etc. Do we understand how cryptographic algorithms work? Are we aware of the directions from which attacks could be launched? Which algorithms can be considered safe at the moment? These and other questions will be answered through examples from ancient to modern cryptographic algorithms and the evolution of both cryptography and cryptanalysis.

Location

Become part of ICT Security conference

5th ICT Security Conference gathers leading experts in cybersecurity, digital forensics, cryptography, network and data security, ethical hacking and fraud prevention. We strive to provide our delegates top-of-the-line content and hands-on experence.

Contact Us

    Subscribe Today!

Submit