{"id":2908,"date":"2025-05-15T06:43:24","date_gmt":"2025-05-15T06:43:24","guid":{"rendered":"https:\/\/renic.es\/agente\/procesado-seguro-de-la-informacion\/"},"modified":"2025-06-02T11:23:13","modified_gmt":"2025-06-02T11:23:13","slug":"procesado-seguro-de-la-informacion","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/procesado-seguro-de-la-informacion\/","title":{"rendered":"Procesado seguro de la informaci\u00f3n"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[476,682,462,444,484,637,582,627,460,587,613,566,487,626,638,466,634,467,674,710,426],"area-investigacion-agente":[414,416,423,421,419,418,417],"ccaa-agente":[729],"ente-juridico-agente":[743],"tipologia-agente":[],"class_list":["post-2908","agente","type-agente","status-publish","hentry","topics-investigacion-egente-access-control-and-authentication","topics-investigacion-egente-anonymous-authentication-systems","topics-investigacion-egente-cloud-computing-en","topics-investigacion-egente-cryptographic-authentication","topics-investigacion-egente-cryptography","topics-investigacion-egente-data-protection-confidentiality","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-iot-privacy","topics-investigacion-egente-lattice-based-homomorphic-encryption","topics-investigacion-egente-management-of-identity","topics-investigacion-egente-new-types-of-malware","topics-investigacion-egente-partial-identity","topics-investigacion-egente-post-quantum-encryption","topics-investigacion-egente-privacy-in-the-cloud","topics-investigacion-egente-proteccion-de-datos-integridad-y-disponibilidad-en","topics-investigacion-egente-secure-computing","topics-investigacion-egente-secure-data-processing","topics-investigacion-egente-secure-multipart-computing","topics-investigacion-egente-security-in-distributed-systems-and-blockchain","topics-investigacion-egente-usability-of-authentication-systems","topics-investigacion-egente-usable-public-key-algorithms","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-data-processing","area-investigacion-agente-identity-management","area-investigacion-agente-interaction-with-the-user-usability","area-investigacion-agente-others","area-investigacion-agente-privacy","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-galicia-en","ente-juridico-agente-gradiant-centro-tecnologico-de-telecomunicaciones-de-galicia-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2908"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2908"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2908"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2908"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2908"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}