- Blockchain and Cryptocurrency
- Signcryption and other smart cryptographic techniques and their applications
- Data security techniques for cloud computing
- Security techniques for the Internet of Things
- Internet scale intrusion detection and prevention
- Zero-day attack prevention
- Security for banking and financial services
- Privacy protected database application testing
- Content extraction signature and other data sanitisation techniques
- Long term, unconditionally secure authenticated encryption and unconditionally secure digital signature technology
- Proactive protection of critical infrastructures
- Secure composition of software systems
- Cryptographic Boolean functions
- Wireless security
- Parasitic and other authentication techniques for personal area networks