Scroll Top
Primary Menu
Home
Members
Research lines
Applied Cryptography
Cyber Defense
Cyber intelligence
Digital Twins
Industrial Security
Secure IoT
Privacy Technologies
Secure Edge-Cloud Continuum
Trust & Reputation Management
Publications
Projects
Current
Past
Activities
Scientific activities
Training
admin
Home
Posts by admin
Quantum-resistant PKE, KEM and Digital Signatures
Quantum-resistant PKE, KEM and Digital Signatures
NICS Cryptography Library
NICS Cryptography Library
Design of a Distributed Intrusion Reaction System Employing Intel vPro Technology
Design of a Distributed Intrusion Reaction System Employing Intel vPro Technology
Anonymous Age Verification
Anonymous Age Verification
A Trust and Reputation Framework for Models@run.time
A Trust and Reputation Framework for Models@run.time
Integration of OpenID Attribute Exchange with Proxy Re-Encryption
Integration of OpenID Attribute Exchange with Proxy Re-Encryption
NICS Secure Events Log Tool
NICS Secure Events Log Tool
Security and QoS Tradeoff (SQT) Tool
Security and QoS Tradeoff (SQT) Tool
DEPHISIT Platform
DEPHISIT Platform
Recommender System for Privacy Solutions in the Smart Grid
Recommender System for Privacy Solutions in the Smart Grid
1
2