Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Explores integrated risk management, disaster costs, mitigation, and crisis management, analyzing the impact of disasters and the distribution of costs.