Procesado seguro de la información
Investigation areas
Attack and defence against threats
Data processing
Identity management
Interaction with the user: usability
Others
Privacy
Reliable and upgradeable systems
Lines of investigation
Access control and authentication
Anonymous authentication systems
Cloud Computing
Cryptographic authentication
Cryptography
Data protection (confidentiality)
Internet of Things
IoT privacy
Lattice-based homomorphic encryption
Management of identity
New types of malware
Partial identity
Post-quantum encryption
Privacy in the cloud
Protección de datos (integridad y disponibilidad)
Secure computing
Secure data processing
Secure multipart computing
Security in distributed systems and blockchain
Usability of authentication systems
Usable public key algorithms