Cryptography, Cyber Security and Network Security

Prof. Harsh K. Verma, Professor, Department of Computer Science Engineering, NIT Jalandhar

Dr. T P Sharma, Associate Professor, NIT Hamirpur

Dr. Chandra Sekhar Obbu, Associate Professor, NIT Delhi

Computer network security consists of measures taken by some organizations or businesses to monitor and avoid unauthorized access from outside attackers. In the initial days of the internet, its use was limited to development purposes. The topics in the track include but are not limited to Design and security analysis of cryptographic primitives and protocols, Novel applications of cryptography, Formal verification of cryptographic security properties, Cryptographic standards, Post-quantum cryptography, Hardware & software implementations. This track also emphasizes emerging research areas in cyber security and privacy. It includes cyber security concepts, threats in cyberspace, security standardization, security and privacy regulations and laws, cyber hacking, digital forensics, Trust management, security and privacy in block chain technologies, cyberspace protection and anti-malware, network traffic analysis, identity and access management in cyber systems, cyber threat intelligence, cryptography trends, steganography, security of cyber-physical systems and IoT, secure cloud and edge computing architectures, security of web-based applications, and cyber harmony and cyber welfare. The track provides an important viewpoint on an established, major research area; support or challenge long-held beliefs in such an area with compelling evidence; or present a convincing, comprehensive new taxonomy of such an area. The topics include, but are not limited to:

  • Security and privacy in mobile systems
  • Security and privacy in adhoc networks
  • Network performance analysis
  • Cyber risk and vulnerability assessment
  • Intrusion detection and prevention
  • Visual analytics for cyber security
  • Security and privacy in Grid computing
  • Biometric security and privacy
  • Security and privacy in Wireless Sensor networks
  • Cryptographic aspects of block chains & crypto currencies
  • Cryptanalysis, Side-channel attacks and defences
  • Trust Management
  • Cyber harmony
  • Vehicle-to- Everything (V2X) Communications
  • Machine-to-Machine(M2M) Communication
Scroll to Top