People

People working in Security and Privacy.

Member Interests
Dr Myrto Arapinis Verification of cryptographic protocols, verification of security properties, detection of attacks, formal models, and protocol composition.
Prof David Aspinall Software security, user authentication, theorem proving, programming and specification languages.
Dr Pramod Bhatotia Software security, secure storage, security for distributed systems, and hardware-assisted security.
Dr James Cheney Programming languages, databases, logic/verification.  Applications to provenance, scientific data management, and security.
Prof Elham Kashefi Quantum cryptography.
Prof Andrew D. Gordon Programming languages and their semantics and logics, with application to security and privacy, machine learning, concurrency, and databases.
Prof Aggelos Kiayias Broad perspective on Cryptography and Cyber Security with emphasis on blockchain systems, e-voting protocols, digital content distribution, privacy and identity management.
Dr Mahesh Marina Mobile authentication and privacy, and distributed intrusion detection.
Dr Paul Patras Performance optimisation in wireless networks, network protocols and architectures, prototyping and test beds. Current research interests include security and privacy of IoT systems.
Dr Subramanian Ramamoorthy Autonomous robotics, Robot learning, Safe and Explainable Artificial Intelligence.
Dr Ian Stark Mobile security and its verification. Formal models of systems and architecture, including security-oriented capability hardware.
Dr Kami Vaniea Human factors of security and privacy, particularly focusing on supporting users in making good security decisions.

Research Assistants

Member Interests
Dr Brian Campbell

Formal modeling of programming languages and instruction sets; software verification and static analysis.

Dr Wei Chen Using formal methods to conduct behavioural analysis for security and privacy in mobile apps.
Dr Anna Pappa Quantum cryptography.
Mr William Waites ISP network operations, surveillance and privacy.
Dr Petros Wallden

Quantum Cryptography, Quantum Computation and Quantum Information Theory.

Dr Thomas Zacharias

E-voting.

Affiliated Staff

Member Interests
Dr Stefano Albrecht Autonomous agents and multi-agent systems, reasoning about the behaviour of interacting agents, applications to cyber security.
Mr Paul Anderson Secure configuration and management of computing infrastructure.
Prof Stuart Anderson Dependable Systems. In particular socio-technical systems, resilience of such systems and how Social Science and Informatics provide a unique perspective on the conception, design, deployment and operation of computer-based systems.
Dr Myungjin Lee Traffic measurement and network monitoring for secure networks.
Dr Vijay Nagarajan

Hardware/software support for reliability, availability, and security.

Prof Gordon Plotkin Algebraic specification and formal software development; correctness of modular systems; resource and security certification for mobile code; security and static analysis.
Dr Michael Rovatsos Human-friendly AI approaches to privacy in data-driven collaborative Web systems. Value-sensitive algorithm design, fairness and transparency in collective intelligence applications.
Prof Don Sannella

Resource certification for mobile code; security and static analysis.

Dr Rik Sarkar Privacy preserving queries for location and trajectory data. Anonymity through clustering and aggregation.
Dr Charles Sutton Machine learning and natural language processing methods for the analysis of computer programs (big code), with applications to security.
Prof Philip Wadler Programming languages, functional languages, type systems, gradual types, session types, concurrency and distribution.
Dr Maria Wolters Privacy and security aspects of mHealth and eHealth, in particular usable security.

Students

Member Interests
Sara S. Albakry User privacy control in the Internet of Things.
David Butler Formal verificaton of cryptographic protocols.
Arthur Chan Formal models of provenance information.

Weili Fu

Provenance for configuration language security.
Alexandru Gheorghiu Quantum cryptography.
Andriana Gkaniatsou Analysis of low-level implementations of cryptographic protocols.
Joseph Hallett Authorization logics.

Nikolaos Lamprou

E-voting.

Georgios Panagiotakos

Provable security of Bitcoin and cryptocurrency protocols.

Valentin Radu

Robust and energy-efficient context detection with smartphones.

Aikaterini Stouka

Cryptography.

Marcin Szymczak

Application of programming language techniques in Bayesian reasoning.

Yiannis Tselekounis

Tamper and leakage resilient cryptography.

Galini Tsoukaneri

Narrow band cellular communications in the Internet of Things.