INFORMATION SECURITY GROUP

Investigation areas

Attack and defence against threats

Evaluation of systems and cyber risk

Identity management

Interaction with the user: usability

Others

Privacy

Promotion and awareness of safety

Lines of investigation

Access control and authentication

Anonymity systems

Anonymous authentication systems

Application of DRM techniques

Attacker identification and location

Audits of security systems

Authentication protocols

Blockchain

Certification

Creation of barriers to entry

Cryptographic authentication

Digital Rights Management

Distributed Ledger Technologies

E-commerce protection

Electronic evidence management

Forensic science

IDS/IPS/Firewalls

Integrity and Authenticity Control of Multimedia Objects

Internet of Things

IoT privacy

Management of identity

Network security

Privacy

Social engineering

System performance improvement

Usability of authentication systems

Usable public key algorithms

Virtualization and network management