• Blockchain and Cryptocurrency
  • Signcryption and other smart cryptographic techniques and their applications
  • Data security techniques for cloud computing
  • Security techniques for the Internet of Things
  • Internet scale intrusion detection and prevention
  • Zero-day attack prevention
  • Security for banking and financial services
  • Privacy protected database application testing
  • Content extraction signature and other data sanitisation techniques
  • Long term, unconditionally secure authenticated encryption and unconditionally secure digital signature technology
  • Proactive protection of critical infrastructures
  • Secure composition of software systems
  • Cryptographic Boolean functions
  • Wireless security
  • Parasitic and other authentication techniques for personal area networks