To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Other
Critical infrastructures
Identity management
Lines of investigation
Architecture of protection
Cryptographic authentication
Authentication of transactions at global level
Cloud Computing
Secure computing
Secure multipart computing
Situational Awareness
Access control and authentication
Cryptography
Development of integrated security environments
Development of tool protection
Threat detection
Anomaly detection
Detection and removal of malware
Detection and monitoring of attacks
Design of security requirements
Fog computing
Internet of Things
Secure development languages and frameworks
Methods and development of protection tools
Network monitoring and security
Secure execution platforms
IoT privacy
Privacy of consultations
Encryption protocols for preserving privacy
Authentication protocols
Private communication networks
Security / privacy through design
Network security
Blockchain security
Digital Twins security
Security in Industry 4.0
Cyber-Physical Systems Security
Security in critical systems (aeronautics, rail, automotive)
Intelligent Transport Systems security
Smart cards
Privacy enhancing technology (PET)
Environment supervision