To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Critical infrastructures
Identity management
Promotion and awareness of safety
Lines of investigation
Cryptographic authentication
Single-use authenticators
Smart cities and safe cities
Secure computing
Secure multipart computing
Access control and authentication
Access control based on behaviour
Cryptography
Post-quantum encryption
Development of tool protection
Internet of Things
Interdisciplinary research (including economics)
Management of identity
Methods and development of protection tools
IoT privacy
Secure processing of encrypted data and signals
Secure data processing
Data protection (confidentiality)
Data protection (integrity and availability)
Encryption protocols for preserving privacy
Authentication protocols
Bridging the digital divide
Security / privacy through design
Network security
Security of mobile devices
Security in critical systems (aeronautics, rail, automotive)
Anonymous authentication systems
Identity theft
Environment supervision