Investigation areas

Attack and defence against threats

Critical infrastructures

Data processing

Identity management

Privacy

Promotion and awareness of safety

Reliable and upgradeable systems

Lines of investigation

Access control and authentication

Anonymous authentication systems

Architecture of protection

Authentication of transactions at global level

Authentication protocols

Certification

Cloud Computing

Communication systems resistant to programmed attacks

Creation of barriers to entry

Cryptographic authentication

Cryptography

Data origination

Data protection (confidentiality)

Design of security requirements

E-mail protection

Electronic evidence management

Encryption protocols for preserving privacy

Fog computing

Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)

Information filtering

Interdisciplinary research (including economics)

Internet of Things

IoT privacy

Maintenance of offline systems

Network security

Network steganography

New types of malware

Onion routing

Post-quantum encryption

Principles of security engineering

Privacy

Protección de datos (integridad y disponibilidad)

Reliable global-level identity generation

Secure execution platforms

Secure integration

Secure processing of encrypted data and signals

Security / privacy through design

Security engineering

Single-use authenticators

Smart cities and safe cities