To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Privacy
Attack and defense against threats
Other
Interaction with the user: usability
Identity management
Promotion and awareness of safety
Evaluation of systems and cyber risk
Lines of investigation
Usable public key algorithms
Application of DRM techniques
Audits of security systems
Cryptographic authentication
Blockchain
Privacy best practices
Certification
Forensic science
Access control and authentication
Integrity and Authenticity Control of Multimedia Objects
Creation of barriers to entry
Distributed Ledger Technologies
Digital Rights Management
Electronic evidence management
Attacker identification and location
IDS/IPS/Firewalls
Social engineering
Internet of Things
Management of identity
System performance improvement
Privacy
IoT privacy
E-commerce protection
Authentication protocols
Network security
Anonymity systems
Anonymous authentication systems
Usability of authentication systems
Virtualization and network management