Investigation areas

Identity management

Privacy

Lines of investigation

Encryption protocols for preserving privacy

Secure multipart computing