- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
- Cloud Data Security Solutions
- Digital Transformation in Industry
- Advanced Authentication Protocols Security
- Caching and Content Delivery
- Law, AI, and Intellectual Property
- Business, Innovation, and Economy
- Network Security and Intrusion Detection
- Distributed systems and fault tolerance
- Vehicular Ad Hoc Networks (VANETs)
- Technology in Education and Healthcare
- Digital Transformation in Law
- Cryptography and Data Security
- Information Technology and Learning
- Privacy-Preserving Technologies in Data
- Advanced Steganography and Watermarking Techniques
- Robotics and Automated Systems
Euskadiko Parke Teknologikoa
2019-2024
Tecnalia
2019-2024
Association of Electronic and Information Technologies
2021-2022
The recent increase in reported incidents of security breaches compromising users' privacy call into question the current centralized model which third-parties collect and control massive amounts personal data. Blockchain has demonstrated that trusted auditable computing is possible using a decentralized network peers accompanied by public ledger. Furthermore, Homomorphic Encryption (HE) guarantees confidentiality not only on computation but also transmission, storage processes. synergy...
The IoT-as-a-Service (IoTaaS) business model has already been identified by some people from both industry and academia, but not formally defined. IoTaaS offers IoT devices on demand, with considerable cost savings resource optimization. In addition, it enables different applications to reuse the existing devices. However, this is associated technological challenges that need be addressed, one of which identity problem. Focusing this, self-sovereign (SSI) schemes have proven provide better...
Blockchain technology is currently being adopted in several domains and applications, including the energy domain specifically smart grids. One of principal applications blockchain peer-to-peer trading among stakeholders grids, providing trusted transactions without need third parties. Also, e-auctions are rapidly growing as a mean e-commerce that allows direct product bidding through internet. major issues reliance on third-party to host e-auction platform which not only induces extra cost...
The Self-Sovereign Identity (SSI) paradigm has emerged as a decentralized Management model with interesting capabilities for the Internet of Things (IoT). However, current standard SSI protocols and procedures only consider that individuals store their own identity, failing to provide an accurate solution identity management groups where participants might use credentials from different identities collaborate meet set verifier´s requirements. present work introduces concept Collaborative...
This document presents a reference architecture for Blockchain-based Threat Registry platform, named BBTR, to share information about treats among different actors. The design of the BBTR guarantees integrity and availability data stored in it is also compatible with privacy requirements, allowing actors participate as users this shared BaaS (Blockchain Service). paper shows how approach can be combined AI techniques extract valuable from threats directly Blockchain, empowering final...
This paper presents a protocol for Identity Management in Industrial IoT enabled devices, that is based on the principles of Self-Sovereign Identity.The Industry 4.0 transformation has led to sector digitalization and one its major challenges uniquely identify Internet Things unattended devices.The digital identity management must allow increasing security control, it been evolving towards model where device acquires responsibility managing own data through Identity.This studies why approach...