K-riptography and information security for open networks (KISON)

Investigation areas

Attack and defence against threats

Identity management

Metrics

Others

Privacy

Reliable and upgradeable systems

Lines of investigation

Anomaly detection

Anonymity systems

Attacker identification and location

Authentication protocols

Big data analysis focussed on privacy

Big data security

Communication systems resistant to programmed attacks

Cryptographic authentication

Data sanitization and anonymization

Digital Rights Management

DLT integration

Electronic evidence management

Encryption protocols for preserving privacy

Fingerprinting

Fog computing

Forensic science

Internet of Things

Network security

Privacy assessment and metrics

Privacy in blockchain systems

Privacy-aware security technologies

Security / privacy through design

Smart contracts

Steganography