{"id":2883,"date":"2025-05-15T06:43:22","date_gmt":"2025-05-15T06:43:22","guid":{"rendered":"https:\/\/renic.es\/agente\/k-riptography-and-information-security-for-open-networks-kison\/"},"modified":"2025-06-02T10:15:16","modified_gmt":"2025-06-02T10:15:16","slug":"k-riptography-and-information-security-for-open-networks-kison","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/k-riptography-and-information-security-for-open-networks-kison\/","title":{"rendered":"K-riptography and information security for open networks (KISON)"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[512,681,568,647,428,663,683,444,657,552,573,553,645,544,546,459,582,662,538,629,701,660,692,530],"area-investigacion-agente":[414,423,420,419,418,417],"ccaa-agente":[724],"ente-juridico-agente":[756],"tipologia-agente":[],"class_list":["post-2883","agente","type-agente","status-publish","hentry","topics-investigacion-egente-anomaly-detection","topics-investigacion-egente-anonymity-systems","topics-investigacion-egente-attacker-identification-and-location","topics-investigacion-egente-authentication-protocols","topics-investigacion-egente-big-data-analysis-focussed-on-privacy","topics-investigacion-egente-big-data-security","topics-investigacion-egente-communication-systems-resistant-to-programmed-attacks","topics-investigacion-egente-cryptographic-authentication","topics-investigacion-egente-data-sanitization-and-anonymization","topics-investigacion-egente-digital-rights-management","topics-investigacion-egente-dlt-integration","topics-investigacion-egente-electronic-evidence-management","topics-investigacion-egente-encryption-protocols-for-preserving-privacy","topics-investigacion-egente-fingerprinting-en","topics-investigacion-egente-fog-computing-en","topics-investigacion-egente-forensic-science","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-network-security","topics-investigacion-egente-privacy-assessment-and-metrics","topics-investigacion-egente-privacy-in-blockchain-systems","topics-investigacion-egente-privacy-aware-security-technologies","topics-investigacion-egente-security-privacy-through-design","topics-investigacion-egente-smart-contracts-en","topics-investigacion-egente-steganography","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-identity-management","area-investigacion-agente-metrics","area-investigacion-agente-others","area-investigacion-agente-privacy","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-cataluna-en","ente-juridico-agente-universidad-oberta-de-catalunya-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2883"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2883"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2883"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2883"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2883"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}