To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Critical infrastructures
Identity management
Promotion and awareness of safety
Evaluation of systems and cyber risk
Lines of investigation
Big data analysis focussed on privacy
Large-scale data analysis
Statistical and predictive risk analysis
Biometric authentication
Cryptographic authentication
Authentication of transactions at global level
Smart cities and safe cities
Secure multipart computing
Verifiable computing
Confidence and reliable big data
Access control and authentication
Creation of barriers to entry
Risk quantification
Development of applications
Development of automatic defences
Anomaly detection
Early detection of cyber risks
Preparation of mechanisms to respond to attacks
Online fraud
Reliable global-level identity generation
Decision-making management tools
Integration of systems
Internet of Things
Secure development languages and frameworks
Management of identity
Improved security in technological standards
Improvement of security protocols and standards
Privacy in the cloud
IoT privacy
Data protection (confidentiality)
Physical data protection
Encryption protocols for preserving privacy
Authentication protocols
Bridging the digital divide
Security / privacy through design
IT attack insurance
Security support services
Threat and attack simulation
Anonymous authentication systems
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Privacy enhancing technology (PET)