To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Privacy
Attack and defense against threats
Metrics
Identity management
Lines of investigation
Biometric authentication
Forensic science
Lattice-based homomorphic encryption
Access control and authentication
Post-quantum encryption
Network steganography
Tools for the secure processing of encrypted signals
Implementation of security and privacy metrics in ICT
Data origination
Privacy
Secure processing of encrypted data and signals
Encryption protocols for preserving privacy
Privacy enhancing technology (PET)