To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Other
Interaction with the user: usability
Critical infrastructures
Identity management
Promotion and awareness of safety
Lines of investigation
Usable public key algorithms
Architecture of protection
Cryptographic authentication
Authentication of transactions at global level
Smart cities and safe cities
Cloud Computing
Access control and authentication
Cryptography
Development of simulation environments for experimentation with trusted systems
Reliable global-level identity generation
Internet of Things
Improvement of security protocols and standards
Secure validation methods
Mobile computing
Computational trust models
Principles of security engineering
Privacy in the cloud
IoT privacy
Secure data processing
User-oriented security programmes
Data protection (integrity and availability)
Authentication protocols
Private communication networks
Network security
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Usability of authentication systems
Usability of security mechanisms
Virtualization and network management