Ideas:
“
On the basis of my multidisciplinary background, my future work is intended to design and evaluate new privacy-preserving security protocols. This aim is addressed by extending my previous results on the use of dynamical systems theory in the cryptanalysis of encryption systems, along with the outcomes derived from coding neural activity and modeling cooperation and information flow in complex networks. These three inverse problems involve the inferring of hidden information from restricted and partial observations, which is the goal when assessing confidentiality and privacy in communication networks. Now partial observations correspond to the information intercepted by an attacker, and the security assessment must confirm that the attacker cannot derive confidential and/or private information from intercepted data. Moreover, the rigorous examination of security cannot be performed unless the attack model is described exhaustively.
”
Feedback