To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Other
Identity management
Evaluation of systems and cyber risk
Lines of investigation
Cloud and web application architecture
Audits of security systems
Cyber risks
Cloud Computing
Secure computing
Access control and authentication
CPSs
Risk quantification
Development of applications
Development of integrated security environments
Development of methodologies for increased reliability and updating of systems
Development of microelectronics
Development of prototypes of dependable systems in applications and infrastructures
Early detection of cyber risks
Design of security requirements
Dynamic evaluation and management of risks
Risk evaluation and prevention
Fog computing
Fuzz testing of industrial systems
Key and certificate management (PKI)
Hardware testing (side-channel attacks and flaw injection)
Security engineering
Integration of systems
Secure integration
Internet of Things
Integrated risk metrics and indicators
Data origination
Penetration testing of industrial systems
Secure execution platforms
Secure data processing based on Hardware Security Module (HSM)
Secure processing of encrypted data and signals
Secure data processing
Data protection (confidentiality)
Data protection (integrity and availability)
Prototyping of reliable and upgradable systems
Harvesting of information on threats
Role-based Access control
Security / privacy through design
Security in operating systems
Security in critical systems (aeronautics, rail, automotive)
Smart cards
Systems Compliance
Robustness testing of communications