News

  • Preparations for the XXVI international professional conference Information Security Summit - IS2 under the title "DIGITAL OPTIMISM" are in full progress. The conference will be held on June 3-4, 2025 in the beautiful Ceremonial Hall of the Czech Technical University in Prague Bethlehem Chapel in Prague. More information HERE...

  • Recordings of selected presentations from last year's IS2 2024 Conference - 29-30 May 2024 - "25 years of IS2 - A SAFE AND DIGITAL SOCIETY" are available. More information HERE...

  • The IS2 2024 conference hosted the panel discussion on "Being Prepared". The accompanying videos with the views of eminent personalities are still available. More information HERE...

back  Back to programme...

 

PETR HANÁCEK

Petr Hanácek is an Associate Professor at the Faculty of Information Technology, at the Brno University of Technology. He has been working in the fields of information system security, risk analysis, applied cryptography, and electronic payment systems for more than ten years. He is an independent consultant in this area.

 

PETR ŠVENDA

Petr Švenda works as an Assistant Professor at Masaryk University, Brno, focusing on the design of cryptographic protocols for wireless sensor networks, cryptographic smart card security, and privacy protection in information technology. He is the author or co-author of more than 15 peer-reviewed publications and participated consultation and development work for academic, governmental and industrial organizations in both the Czech Republic and abroad.

 

CRYPTOGRAPHY FOR (PARTIALLY) COMPROMISED SENSOR NETWORKS

Wireless sensor networks are not just another technology, but also exhibit new and complex problems from the security perspective. The majority of the existing security approaches are unsuitable or even impossible to deploy due to the combination of decentralized tasks with high numbers of energy and computational-limited nodes positioned, typically, out of our permanent physical control. Non-conventional and/or novel security techniques are to be considered for situations where a partial network compromise is to be expected.

What interests you?

sliva 2017 1

DSM Magazine

DSM is a professional quarterly magazine focused on information security and data protection problematics. Our goal is to provide an up-to- date overview of development trends in broader context.

More...

is2 20 let

Conference IS2

Prestigious international conference on information security, organized under the auspices of prominent representatives of the Czech government and other important personalities..

More...

 
 

Partnerská společnost
icz logo banner small v2

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top