Seguridad Informática y Criptografía
Investigation areas
Attack and defence against threats
Critical infrastructures
Data processing
Identity management
Privacy
Reliable and upgradeable systems
Lines of investigation
Attacker identification and location
Authentication protocols
Cloud Computing
Cryptographic authentication
Cryptography
Cyber risks
Data protection (confidentiality)
Detection and removal of malware
Development of threat detection tools
Development of tool protection
Encryption protocols for preserving privacy
Forensic science
Internet of Things
Large-scale data analysis
Lattice-based homomorphic encryption
Mobile computing
Mobile privacy-preserving applications
Network monitoring and security
Network security
Onion routing
Online fraud
Preparation of mechanisms to respond to attacks
Privacy in the cloud
Private Information Retrieval (PIR)
Protección de datos (integridad y disponibilidad)
Risk management and analysis
Role-based access control
Secure computing
Secure data processing
Secure development languages and frameworks
Secure execution platforms
Secure multipart computing
Security / privacy through design
Security in operating systems
Threat detection
Verifiable computing