This paper provides an overview of the security architecture for Law Enforcement Agencies (LEAs) designed by the INDECT project, and in particular the security infrastructures that have been deployed so far. These security infrastructures can be organized in the following main areas: Public Key Infrastructure (PKI) and user management, communications security, and new cryptographic algorithms. This paper presents the new ideas, architectures and deployed testbeds for these areas. In particular, it explains the inner structure of the INDECT PKI employed for federated identity management, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) – a novel cryptographic algorithm that has being integrated into OpenS...
Abstract—This paper presents possible path for securing public IT services. Public sector IT service...
Abstract. To meet demands for increased interconnectivity, efficiency or competitiveness, organizati...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
Published online: 22 June 2013. This paper is an improved version of “Security Infrastructures: Tow...
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy ...
DOI nefunkční (9.7.2018)This paper evaluates the performance of the key elements of the security arc...
Abstract—This paper will present building of secured intrusion detection system (IDS) infrastructure...
This paper evaluates the performance of the key elements of the security architecture developed by t...
Physical security systems, such as bulgar alarms, surveillance cameras and door access control syste...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
Abstract—Network security has become an essential business requirement over the past few years. As t...
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
Secure connections on the Internet are crucial to many ap-plications. Nowadays infrastructure for se...
Abstract—This paper presents possible path for securing public IT services. Public sector IT service...
Abstract. To meet demands for increased interconnectivity, efficiency or competitiveness, organizati...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
Published online: 22 June 2013. This paper is an improved version of “Security Infrastructures: Tow...
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy ...
DOI nefunkční (9.7.2018)This paper evaluates the performance of the key elements of the security arc...
Abstract—This paper will present building of secured intrusion detection system (IDS) infrastructure...
This paper evaluates the performance of the key elements of the security architecture developed by t...
Physical security systems, such as bulgar alarms, surveillance cameras and door access control syste...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
Abstract—Network security has become an essential business requirement over the past few years. As t...
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
Secure connections on the Internet are crucial to many ap-plications. Nowadays infrastructure for se...
Abstract—This paper presents possible path for securing public IT services. Public sector IT service...
Abstract. To meet demands for increased interconnectivity, efficiency or competitiveness, organizati...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...