To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Data processing
Privacy
Attack and defense against threats
Interaction with the user: usability
Identity management
Promotion and awareness of safety
Lines of investigation
Big data analysis focussed on privacy
Large-scale data analysis
Biometric authentication
Cryptographic authentication
Privacy best practices
Search for the origin of the threat
Development of threat detection tools
Anomaly detection
Detection and monitoring of attacks
User-centred design and usability of cybersecurity
Reliable global-level identity generation
Attacker identification and location
Human-System Interaction
Interdisciplinary research (including economics)
Empowering user capabilities
Privacy
Secure data processing
Bridging the digital divide
Security systems adapted to usage patterns
Customer Centric Technologies
Privacy-aware security technologies
Visualisation of techniques to facilitate intelligibility