s
About Us
Lorem Ipsum is simply dummy text ofering thetonat sunrising printing and typesetting industry seo is partysipati carma. Lorem Ipsum is simply dummy,
Follow Us

Blog

INTRODUCTION TO CRYPTOGRAPHY COURSE

Welcome to the Introduction to Cryptography course.

This Course is designed to explore Cryptography as a potential specialization in IT career.

These course materials will assist you in developing the skills necessary to do the following:

  • Classical and modern cryptographic algorithms.
  • Cryptographic algorithms with symmetric and asymmetric key.
  • Cyber attacks and how are they made on this algorithms based on cryptoanalysis.

Date: 29.05.2021

Time: 12:00-15:00

Language: Albanian

To attend this training please fill this Google Form – https://forms.gle/TBfq8ftGus4B1DCn6

The lecturer on this course will be Prof. Dr. Artan Luma.

Artan Luma was born on 23.02.1979, in Tetovo, Macedonia. He finished his primary and secondary school in Tetovo, Macedonia. Graduated in 2002 his bachelor studies in Computer Sciences at State University of Tetovo in Tetovo, Macedonia. Graduated his master studies in 2007 at State University of Prishtina in Prishtina, Kosovo, with the master thesis entitled “Possibilities for Creation of a Hypermedial Software for Interactive Learning”. He enrolled doctoral studies in September 2007 at South East European University in Tetovo, Macedonia. He gained his doctoral degree in Computer Science with the thesis entitled “Algorithms of Several Mathematical Models and their Implementation in Cryptosystems” in May 2010.

Participation in scientific and professional meetings and conferences, has published 17 journal articles and 45 papers in international conferences. His work is cited in over 71 papers published in international journals and conferences during the last five years, including several citations in highly ranked impact factor journals.

Publications in journals are published in International Peer-Reviewed Journals, most of them indexed in Clarivate Analytics – Emerging Sources Index, EBSCOHost and/or Scopus.

Publications in conferences are published in conference proceedings, a significant number of them published by IEEE or ACM as well as specific topicx-related International conferences. The publications are in fields of Computer System Security, Computer Security, Information Security, Information Systems Security, Cloud Security, Security, Cryptography, Algorithm and Education.

No Comments

Sorry, the comment form is closed at this time.

Font Resize
Click to listen highlighted text!