K-riptography and information security for open networks (KISON)
Investigation areas
Attack and defence against threats
Identity management
Metrics
Others
Privacy
Reliable and upgradeable systems
Lines of investigation
Anomaly detection
Anonymity systems
Attacker identification and location
Authentication protocols
Big data analysis focussed on privacy
Big data security
Communication systems resistant to programmed attacks
Cryptographic authentication
Data sanitization and anonymization
Digital Rights Management
DLT integration
Electronic evidence management
Encryption protocols for preserving privacy
Fingerprinting
Fog computing
Forensic science
Internet of Things
Network security
Privacy assessment and metrics
Privacy in blockchain systems
Privacy-aware security technologies
Security / privacy through design
Smart contracts
Steganography