CriptoLab
Investigation areas
Attack and defence against threats
Critical infrastructures
Data processing
Identity management
Privacy
Promotion and awareness of safety
Reliable and upgradeable systems
Lines of investigation
Access control and authentication
Anonymous authentication systems
Architecture of protection
Authentication of transactions at global level
Authentication protocols
Certification
Cloud Computing
Communication systems resistant to programmed attacks
Creation of barriers to entry
Cryptographic authentication
Cryptography
Data origination
Data protection (confidentiality)
Design of security requirements
E-mail protection
Electronic evidence management
Encryption protocols for preserving privacy
Fog computing
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Information filtering
Interdisciplinary research (including economics)
Internet of Things
IoT privacy
Maintenance of offline systems
Network security
Network steganography
New types of malware
Onion routing
Post-quantum encryption
Principles of security engineering
Privacy
Protección de datos (integridad y disponibilidad)
Reliable global-level identity generation
Secure execution platforms
Secure integration
Secure processing of encrypted data and signals
Security / privacy through design
Security engineering
Single-use authenticators
Smart cities and safe cities