To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Critical infrastructures
Identity management
Promotion and awareness of safety
Lines of investigation
Architecture of protection
Cryptographic authentication
Authentication of transactions at global level
Single-use authenticators
Certification
Smart cities and safe cities
Cloud Computing
Access control and authentication
Integrity and Authenticity Control of Multimedia Objects
Creation of barriers to entry
Cryptography
Post-quantum encryption
Design of security requirements
Network steganography
Information filtering
Fog computing
Reliable global-level identity generation
Electronic evidence management
Security engineering
Secure integration
Internet of Things
Interdisciplinary research (including economics)
Maintenance of offline systems
New types of malware
Onion routing
Data origination
Secure execution platforms
Principles of security engineering
Privacy
IoT privacy
Secure processing of encrypted data and signals
E-mail protection
Data protection (confidentiality)
Data protection (integrity and availability)
Encryption protocols for preserving privacy
Authentication protocols
Security / privacy through design
Network security
Anonymous authentication systems
Communication systems resistant to programmed attacks
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)