Seguridad Informática y Criptografía

Investigation areas

Attack and defence against threats

Critical infrastructures

Data processing

Identity management

Privacy

Reliable and upgradeable systems

Lines of investigation

Attacker identification and location

Authentication protocols

Cloud Computing

Cryptographic authentication

Cryptography

Cyber risks

Data protection (confidentiality)

Detection and removal of malware

Development of threat detection tools

Development of tool protection

Encryption protocols for preserving privacy

Forensic science

Internet of Things

Large-scale data analysis

Lattice-based homomorphic encryption

Mobile computing

Mobile privacy-preserving applications

Network monitoring and security

Network security

Onion routing

Online fraud

Preparation of mechanisms to respond to attacks

Privacy in the cloud

Private Information Retrieval (PIR)

Protección de datos (integridad y disponibilidad)

Risk management and analysis

Role-based access control

Secure computing

Secure data processing

Secure development languages and frameworks

Secure execution platforms

Secure multipart computing

Security / privacy through design

Security in operating systems

Threat detection

Verifiable computing