TECHNOLOGICAL CAPABILITIES
PRIVACY AND DATA PROTECTION
- Privacy
- Personal data management
- Protection of copyright and digital content distribution rights
- Suitable codes for fingerprinting and/or watermarking
- Tracing codes
- Cryptographic protocols for a Secure Digital Society:
- Cryptographic key generation and management systems
- Encryption and digital signature schemes with advanced features
- Post-quantum cryptography
- Distributed cryptography and computation outsourcing
- Data protection/applications for mobile phones
- Secure storage
- Secure elements
- Trusted execution environments
CONSULTANCY, AUDITING AND SECURITY ANALYSIS
- Consultancy
- Auditing
- OWASP methodology
- OSStMM methodology
- Computer, mobile and network forensics
- Chain of custody
- Search for digital evidence
- Expert inspections
- Penetration test
- Incident response
- Implementation and adaptation
- GUAITA platform: management of software vulnerabilities
CLOUD AND BIG DATA
- Cloud computing security
- Big data protection
- Security for SMEs
- Security in networks and services
CYBERSECURITY COMPLIANCE AND BUSINESS CONTINUITY
- Compliance and security policies
- Cybersecurity risk assessment
- Business continuity plan to protect and to recover
INFRASTRUCTURE SECURITY
- Critical infrastructure
- Internet of Things
- Smart transport
- Cybersecurity for smart infrastructure
TRAINING AND EDUCATION
TRUST AND SECURITY SERVICES
- Identity, authentication and authorization
- Secure identity
- Anonymity
- Reputation systems
- Optimization and decentralization of PKI
- Delegated and federated authorizations
- Biometrics
- Payment and finance services
- Electronic society
- e-Payment
- e-Commerce
- e-Democracy
- e-Governance
- e-Health
- Blockchain
- Distributed ledgers
- Creation, management and auditing of smart contracts
- Self-sovereign identity
- v
RELATED PROJECTS