To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Other
Interaction with the user: usability
Identity management
Lines of investigation
Usable public key algorithms
Cryptographic authentication
Lattice-based homomorphic encryption
Cloud Computing
Secure computing
Secure multipart computing
Access control and authentication
Cryptography
Post-quantum encryption
Partial identity
Internet of Things
Management of identity
New types of malware
Privacy in the cloud
IoT privacy
Secure data processing
Data protection (confidentiality)
Data protection (integrity and availability)
Encryption protocols for preserving privacy
Security / privacy through design
Security in distributed systems and blockchain
Anonymous authentication systems
Usability of authentication systems