To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Critical infrastructures
Identity management
Lines of investigation
Large-scale data analysis
Risk management and analysis
Mobile privacy-preserving applications
Cryptographic authentication
Cyber risks
Forensic science
Lattice-based homomorphic encryption
Cloud Computing
Secure computing
Secure multipart computing
Verifiable computing
Cryptography
Development of threat detection tools
Development of tool protection
Threat detection
Detection and removal of malware
Preparation of mechanisms to respond to attacks
Online fraud
Attacker identification and location
Internet of Things
Secure development languages and frameworks
Mobile computing
Network monitoring and security
Onion routing
Secure execution platforms
Privacy in the cloud
Private Information Retrieval (PIR)
Secure data processing
Data protection (confidentiality)
Data protection (integrity and availability)
Encryption protocols for preserving privacy
Authentication protocols
Role-based Access control
Security / privacy through design
Network security
Security in operating systems