Cryptography for Emerging Technologies and Applications

Tuesday, August 23, 2011

Headlines

69dafe8b58066478aea48f3d0f384820

The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications.

The workshop provides an opportunity for industry, research and academia communities, and government sectors, to identify cryptographic challenges encountered in their development of emerging technologies and applications, and to learn about NIST's current cryptographic research, activities, programs and standards development.

In preparation for the workshop, NIST calls for the submission of abstracts that identify cryptographic challenges identified during the research and development of emerging technologies and applications.

Submitted abstracts will be posted on csrc.nist.gov before the workshop, and the authors of selected abstracts will be invited to present their work during the workshop. The deadline for abstract submission is September 26, 2011 at 5:00 PM Eastern Daylight Saving Time.

Examples of emerging or evolving technology spaces include: 

  • Sensor and building networks
  • Mobile devices
  • Smart Objects/Internet of Things, and
  • Cyber physical systems

Examples of cryptographic requirements for emerging sectors might include performance or resource issues, cryptographic services (such as anonymous or group signatures), or key management challenges. 

Authors are welcome to identify, through their submissions, other areas of cryptography for emerging technologies and applications that are not listed above.

More information on the workshop can be found here:

Source:  http://www.nist.gov/itl/csd/ct/ceta-workshop.cfm

Help Support Infosec Island by Tweeting and Stumbling our Articles - and join our LinkedIn Group HERE - Thanks!

Possibly Related Articles:
4850
General
Encryption NIST Research Mobile Devices Networks Information Technology Headlines Cryptography
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.

Most Liked