Home » R&I Project Hub » Http< » Body>< » R&I Project Hub

R&I Project Hub

PACT

The project Public Perception of Security and Privacy: Assessing Knowledge, Collecting Evidence, Translating Research into Action (PACT) is a three year collaborative project under the EU 7th Framework research programme led by CSSC - Centre for Science, Society and Citizenship in Rome. PACT seeks to develop and validate an evidence-based Privacy Reference Framework for a Security Decision Support System that may assist end-users and policy makers to consider human rights, privacy and fundamental rights when they evaluate pros and cons of specific security investments and measures.

OCGN

There are a few EU publications on cyber security/cyber crime and the gambling sector. This proposal is novel in that it focused on the threat to the integrity of online gambling sites from organised criminal elements in the EU (most research on this subject is done in the USA), and their ability to withstand threats, intimidation and extortion and responses to these threats.

MAS2TERING

MAS2TERING was a three-year technology-driven and business-focused project (2014-2017), aimed at developing an innovative information and communication technology (ICT) platform for the monitoring and optimal management of local communities of prosumers. MAS2TERING combined an original business vision, with goals towards the enablement of local energy aggregation markets, utilizing a set of enabling technologies from the artificial intelligence, communications, and security domains.

LV-Pri20

The goal of the LV-Pri20 project is to aid our ICT-driven lives, by “safeguarding the human right of privacy in the digital society”. Concretely, the main focus of LV-Pri20 is the formal and automatic analysis of privacy-preservation in today’s ICT. LV-Pri20 will focus on the prevalent wireless media, e.g., RF-identification protocols, remote car-unlocking, wearables, machine-to-machine communication in the Internet of Things (IoT)/ubiquitous computing, but it will not neglect wired environments (given their common cloud-connection).

HIPS

Until now, research in efficient cryptographic protocols has typically been in two different directions. The first direction, and the major one, is to construct more efficient protocols and prove them secure, where efficiency is measured by the amount of communication sent, the number of heavy cryptographic operations carried out (e.g., exponentiations), and so on. The second direction is to take the state-of-the-art protocols and implement them while optimising the implementation based on systems concerns.

FIDELITY

FIDELITY is a multi-disciplinary initiative which will analyse shortcomings and vulnerabilities in the whole ePassports life cycle and develop technical solutions and recommendations to overcome them. FIDELITY will demonstrate privacy enhanced solutions to:

ECRYPT-NET

ECRYPT-NET is a research network of six universities and two companies, as well as 7 associated companies, that intends to develop advanced cryptographic techniques for the Internet of Things and the Cloud and to create efficient and secure implementations of those techniques on a broad range of platforms.

ECRYPT-CSA

The goal of ECRYPT-CSA is to strengthen European excellence in the area of cryptology and to build on the Network of Excellence ECRYPT and ECRYPT II to achieve a durable integration and structuring of the European cryptography community, involving academia, industry, law enforcement and defence agencies. The project has the following concrete objectives:

DAPPER

This Marie Curie career integration project considered the whole data release process, from the data owner to the data user. It laid out a set of principles for privacy tool design that highlight the requirements for interoperability, extensibility and scalability. The aim of the project was in Delivering Anonymization Practically, Privately, Effectively and Reusably (DAPPER).  It produced published results under the following four themes:

COCKPITCI

The CockpitCI vision identifies the need to complement business awareness with cyber-security awareness in order to reach a superior level of awareness (global awareness) and increase the business continuity of the infrastructure.

Pages