Published online: 22 June 2013. This paper is an improved version of “Security Infrastructures: Towards the INDECT System Security” from the same authors, presented in the 5th International Conference on Multimedia Communication Services & Security (MCSS 2012), Krakow (Poland), May 31- June 1, 2012.This paper provides an overview of the security architecture for Law Enforcement Agencies (LEAs) designed by the INDECT project, and in particular the security infrastructures that have been deployed so far. These security infrastructures can be organized in the following main areas: Public Key Infrastructure (PKI) and user management, communications security, and new cryptographic algorithms. This paper presents the new ideas, architectures and...
Third generation city-wide distributed surveillance systems are built upon networks of sensors, actu...
The problem of securely storing and processing sensitive data is paramount in many sectors. But ICT ...
Secure connections on the Internet are crucial to many ap-plications. Nowadays infrastructure for se...
This paper provides an overview of the security architecture for Law Enforcement Agencies (LEAs) des...
This paper evaluates the performance of the key elements of the security architecture developed by t...
This paper evaluates the performance of the key elements of the security architecture developed by t...
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy ...
Abstract—This paper will present building of secured intrusion detection system (IDS) infrastructure...
Abstract—Network security has become an essential business requirement over the past few years. As t...
The monograph presents new results in various areas of ensuring the information security of the crit...
Physical security systems, such as bulgar alarms, surveillance cameras and door access control syste...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
Secure vehicular communication has been discussed over a long period of time. Now,- this technology ...
Third generation city-wide distributed surveillance systems are built upon networks of sensors, actu...
The problem of securely storing and processing sensitive data is paramount in many sectors. But ICT ...
Secure connections on the Internet are crucial to many ap-plications. Nowadays infrastructure for se...
This paper provides an overview of the security architecture for Law Enforcement Agencies (LEAs) des...
This paper evaluates the performance of the key elements of the security architecture developed by t...
This paper evaluates the performance of the key elements of the security architecture developed by t...
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy ...
Abstract—This paper will present building of secured intrusion detection system (IDS) infrastructure...
Abstract—Network security has become an essential business requirement over the past few years. As t...
The monograph presents new results in various areas of ensuring the information security of the crit...
Physical security systems, such as bulgar alarms, surveillance cameras and door access control syste...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
Secure vehicular communication has been discussed over a long period of time. Now,- this technology ...
Third generation city-wide distributed surveillance systems are built upon networks of sensors, actu...
The problem of securely storing and processing sensitive data is paramount in many sectors. But ICT ...
Secure connections on the Internet are crucial to many ap-plications. Nowadays infrastructure for se...