INFORMATION SECURITY GROUP
Investigation areas
Attack and defence against threats
Evaluation of systems and cyber risk
Identity management
Interaction with the user: usability
Others
Privacy
Promotion and awareness of safety
Lines of investigation
Access control and authentication
Anonymity systems
Anonymous authentication systems
Application of DRM techniques
Attacker identification and location
Audits of security systems
Authentication protocols
Blockchain
Certification
Creation of barriers to entry
Cryptographic authentication
Digital Rights Management
Distributed Ledger Technologies
E-commerce protection
Electronic evidence management
Forensic science
IDS/IPS/Firewalls
Integrity and Authenticity Control of Multimedia Objects
Internet of Things
IoT privacy
Management of identity
Network security
Privacy
Social engineering
System performance improvement
Usability of authentication systems
Usable public key algorithms
Virtualization and network management