To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Critical infrastructures
Identity management
Promotion and awareness of safety
Evaluation of systems and cyber risk
Lines of investigation
Architecture of protection
Resilient architectures
Cryptographic authentication
Authentication of transactions at global level
Access control and authentication
Post-quantum encryption
Security engineering
Internet of Things
Mechanisms for data harvesting
Improvement of security protocols and standards
System performance improvement
Mobile computing
Network monitoring and security
Privacy-aware trust negotiations
Privacy
IoT privacy
Secure processing of encrypted data and signals
Data protection (confidentiality)
Data protection (integrity and availability)
Encryption protocols for preserving privacy
Authentication protocols
Bridging the digital divide
Role-based Access control
Network security
Security in critical systems (aeronautics, rail, automotive)
Communication systems resistant to programmed attacks
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Virtualization and network management