{"id":2928,"date":"2025-05-15T06:43:26","date_gmt":"2025-05-15T06:43:26","guid":{"rendered":"https:\/\/renic.es\/agente\/seguridad-informatica-y-criptografia\/"},"modified":"2025-06-02T11:40:40","modified_gmt":"2025-06-02T11:40:40","slug":"seguridad-informatica-y-criptografia","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/seguridad-informatica-y-criptografia\/","title":{"rendered":"Seguridad Inform\u00e1tica y Criptograf\u00eda"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[568,647,462,444,484,457,637,517,501,502,645,459,582,429,460,597,434,605,662,614,547,526,626,630,638,433,656,466,634,586,620,467,660,671,511,468],"area-investigacion-agente":[414,422,416,423,418,417],"ccaa-agente":[727],"ente-juridico-agente":[746],"tipologia-agente":[],"class_list":["post-2928","agente","type-agente","status-publish","hentry","topics-investigacion-egente-attacker-identification-and-location","topics-investigacion-egente-authentication-protocols","topics-investigacion-egente-cloud-computing-en","topics-investigacion-egente-cryptographic-authentication","topics-investigacion-egente-cryptography","topics-investigacion-egente-cyber-risks","topics-investigacion-egente-data-protection-confidentiality","topics-investigacion-egente-detection-and-removal-of-malware","topics-investigacion-egente-development-of-threat-detection-tools","topics-investigacion-egente-development-of-tool-protection","topics-investigacion-egente-encryption-protocols-for-preserving-privacy","topics-investigacion-egente-forensic-science","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-large-scale-data-analysis","topics-investigacion-egente-lattice-based-homomorphic-encryption","topics-investigacion-egente-mobile-computing-en","topics-investigacion-egente-mobile-privacy-preserving-applications","topics-investigacion-egente-network-monitoring-and-security","topics-investigacion-egente-network-security","topics-investigacion-egente-onion-routing-en","topics-investigacion-egente-online-fraud","topics-investigacion-egente-preparation-of-mechanisms-to-respond-to-attacks","topics-investigacion-egente-privacy-in-the-cloud","topics-investigacion-egente-private-information-retrieval-pir-en","topics-investigacion-egente-proteccion-de-datos-integridad-y-disponibilidad-en","topics-investigacion-egente-risk-management-and-analysis","topics-investigacion-egente-role-based-access-control-en","topics-investigacion-egente-secure-computing","topics-investigacion-egente-secure-data-processing","topics-investigacion-egente-secure-development-languages-and-frameworks","topics-investigacion-egente-secure-execution-platforms","topics-investigacion-egente-secure-multipart-computing","topics-investigacion-egente-security-privacy-through-design","topics-investigacion-egente-security-in-operating-systems","topics-investigacion-egente-threat-detection","topics-investigacion-egente-verifiable-computing","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-critical-infrastructures","area-investigacion-agente-data-processing","area-investigacion-agente-identity-management","area-investigacion-agente-privacy","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-comunidad-de-madrid","ente-juridico-agente-instituto-imdea-software-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2928"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2928"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2928"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2928"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2928"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}