To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Other
Metrics
Identity management
Lines of investigation
Big data analysis focussed on privacy
Cryptographic authentication
Forensic science
Anomaly detection
Steganography
Privacy assessment and metrics
Fingerprinting
Fog computing
Digital Rights Management
Electronic evidence management
Attacker identification and location
DLT integration
Internet of Things
IoT privacy
Privacy in blockchain systems
Encryption protocols for preserving privacy
Authentication protocols
Data sanitization and anonymization
Security / privacy through design
Network security
Big data security
Anonymity systems
Communication systems resistant to programmed attacks
Smart contracts
Privacy-aware security technologies