Investigation areas

Attack and defence against threats

Data processing

Identity management

Interaction with the user: usability

Others

Privacy

Reliable and upgradeable systems

Lines of investigation

Access control and authentication

Anonymous authentication systems

Cloud Computing

Cryptographic authentication

Cryptography

Data protection (confidentiality)

Internet of Things

IoT privacy

Lattice-based homomorphic encryption

Management of identity

New types of malware

Partial identity

Post-quantum encryption

Privacy in the cloud

Protección de datos (integridad y disponibilidad)

Secure computing

Secure data processing

Secure multipart computing

Security in distributed systems and blockchain

Usability of authentication systems

Usable public key algorithms