People working in Security and Privacy.
|Dr Myrto Arapinis||Verification of cryptographic protocols, verification of security properties, detection of attacks, formal models, and protocol composition.|
|Prof David Aspinall||Software security, user authentication, theorem proving, programming and specification languages.|
|Dr Pramod Bhatotia||Software security, secure storage, security for distributed systems, and hardware-assisted security.|
|Dr James Cheney||Programming languages, databases, logic/verification. Applications to provenance, scientific data management, and security.|
|Prof Andrew D. Gordon||Programming languages and their semantics and logics, with application to security and privacy, machine learning, concurrency, and databases.|
|Prof Elham Kashefi||Quantum cryptography.|
|Prof Aggelos Kiayias||Broad perspective on Cryptography and Cyber Security with emphasis on blockchain systems, e-voting protocols, digital content distribution, privacy and identity management.|
|Dr Markulf Kohlweiss||
Verification of cryptographic implementations, cryptographic currencies and zero-knowledge proof systems, privacy and anti-surveillance, ethics in cryptography
|Dr Mahesh Marina||Mobile authentication and privacy, and distributed intrusion detection.|
|Dr Paul Patras||Performance optimisation in wireless networks, network protocols and architectures, prototyping and test beds. Current research interests include security and privacy of IoT systems.|
|Dr Subramanian Ramamoorthy||Autonomous robotics, Robot learning, Safe and Explainable Artificial Intelligence.|
|Dr Ian Stark||Mobile security and its verification. Formal models of systems and architecture, including security-oriented capability hardware.|
|Dr Kami Vaniea||Human factors of security and privacy, particularly focusing on supporting users in making good security decisions.|
|Dr Vassilis Zikas||
Cryptography with emphasis on secure multi-party computation and distributed computation, blockchain technology, rational cryptography, and privacy.
|Dr Brian Campbell||
Formal modeling of programming languages and instruction sets; software verification and static analysis.
|Dr Wei Chen||Using formal methods to conduct behavioural analysis for security and privacy in mobile apps.|
|Dr Vashti Galpin||Formal modelling and verification of network security.|
|Ms Andriana Gkaniatsou|
|Dr Yuhui Lin||
Formal modelling and verification of network security.
|Mr William Waites||ISP network operations, surveillance and privacy.|
|Dr Petros Wallden||
Quantum Cryptography, Quantum Computation and Quantum Information Theory.
|Dr Thomas Zacharias||
|Dr Stefano Albrecht||Autonomous agents and multi-agent systems, reasoning about the behaviour of interacting agents, applications to cyber security.|
|Mr Paul Anderson||Secure configuration and management of computing infrastructure.|
|Prof Stuart Anderson||Dependable Systems. In particular socio-technical systems, resilience of such systems and how Social Science and Informatics provide a unique perspective on the conception, design, deployment and operation of computer-based systems.|
|Dr Myungjin Lee||Traffic measurement and network monitoring for secure networks.|
|Dr Vijay Nagarajan||
Hardware/software support for reliability, availability, and security.
|Prof Gordon Plotkin||Algebraic specification and formal software development; correctness of modular systems; resource and security certification for mobile code; security and static analysis.|
|Dr Michael Rovatsos||Human-friendly AI approaches to privacy in data-driven collaborative Web systems. Value-sensitive algorithm design, fairness and transparency in collective intelligence applications.|
|Prof Don Sannella||
Resource certification for mobile code; security and static analysis.
|Dr Rik Sarkar||Privacy preserving queries for location and trajectory data. Anonymity through clustering and aggregation.|
|Dr Charles Sutton||Machine learning and natural language processing methods for the analysis of computer programs (big code), with applications to security.|
|Prof Philip Wadler||Programming languages, functional languages, type systems, gradual types, session types, concurrency and distribution.|
|Dr Maria Wolters||Privacy and security aspects of mHealth and eHealth, in particular usable security.|
|Sara S. Albakry||User privacy control in the Internet of Things.|
|David Butler||Formal verificaton of cryptographic protocols.|
|Arthur Chan||Formal models of provenance information.|
|Provenance for configuration language security.|
|Alexandru Gheorghiu||Quantum cryptography.|
|Andriana Gkaniatsou||Analysis of low-level implementations of cryptographic protocols.|
|Provable security of Bitcoin and cryptocurrency protocols.|
|Robust and energy-efficient context detection with smartphones.|
|Application of programming language techniques in Bayesian reasoning.|
|Tamper and leakage resilient cryptography.|
|Narrow band cellular communications in the Internet of Things.|
|Member & year of graduation||Interests|
|Joseph Hallett (2017)||Authorization logics.|