People
Academic staff working in Security, Privacy and Trust
Member | Interests |
---|---|
Dr Myrto Arapinis | Verification of cryptographic protocols, verification of security properties, detection of attacks, formal models, and protocol composition. |
Prof David Aspinall | Software security and verification, network security and AI/ML methods, secure programming and formal methods for security. |
Dr Michele Ciampi | Cryptography with emphasis on zero-knowledge protocol, secure multi-party computation, blockchain technology and non-malleable cryptographic protocol. |
Prof James Cheney | Programming languages, databases, logic/verification. Applications to provenance, scientific data management, and security. |
Dr Tariq Elahi | Anonymous communications, censorship resistance, and the internet of things. |
Dr Marc Juarez |
Network traffic analysis, anonymous communications, applied machine learning to security and privacy, adversarial machine learning, and algorithmic bias. |
Prof Elham Kashefi | Quantum cryptography. |
Prof Aggelos Kiayias | Broad perspective on cryptography and Cyber Security with emphasis on blockchain systems, e-voting protocols, digital content distribution, privacy and identity management. |
Dr Nadin Kokciyan | Multi-agent systems, computational argumentation, and privacy in social software. |
Dr Markulf Kohlweiss |
Verification of cryptographic implementations, cryptographic currencies and zero-knowledge proof systems, privacy and anti-surveillance, ethics in cryptography |
Dr Jingjie Li | User-centric security and privacy: understanding human factors of security and privacy and designing more secure and private systems for emerging digital technologies. |
Dr Chris Xiaoxuan Lu | Safety and Reliability of Mobile Robotics, Side Channels in Internet of Things, Usable Biometrics for Wearables, Identity and Location Privacy, Mixed Reality. |
Dr Tiejun Ma | Risk and Decision Analytics |
Prof Mahesh Marina | Mobile authentication and privacy, and distributed intrusion detection. |
Dr Yuvraj Patel | Computer systems including security in concurrency and operating systems. |
Prof Paul Patras | Performance optimisation in wireless networks, network protocols and architectures, prototyping and test beds. Current research interests include security and privacy of IoT systems. |
Dr Ian Stark | Mobile security and its verification. Formal models of systems and architecture, including security-oriented capability hardware. |
Dr Petros Wallden | Quantum Cryptography, Quantum Computation and Quantum Information Theory. |
Dr Daniel Woods | Economics of security and privacy focusing on cyber insurance, risk quantification and incident response. |
Affiliated staff
Member | Interests |
---|---|
Dr Stefano Albrecht | Autonomous agents and multi-agent systems, reasoning about the behaviour of interacting agents, applications to cyber security. |
Mr Paul Anderson | Secure configuration and management of computing infrastructure. |
Prof Stuart Anderson | Dependable Systems. In particular socio-technical systems, resilience of such systems and how Social Science and Informatics provide a unique perspective on the conception, design, deployment and operation of computer-based systems. |
Dr Chris Heunen | Semantics of quantum theory and programming languages; category theory; quantum logic; functional analysis. |
Prof Vijay Nagarajan |
Hardware/software support for reliability, availability, and security. |
Prof Gordon Plotkin | Algebraic specification and formal software development; correctness of modular systems; resource and security certification for mobile code; security and static analysis. |
Prof Ram Ramamoorthy | Autonomous robotics, Robot learning, Safe and Explainable Artificial Intelligence. |
Prof Michael Rovatsos | Human-friendly AI approaches to privacy in data-driven collaborative Web systems. Value-sensitive algorithm design, fairness and transparency in collective intelligence applications. |
Prof Don Sannella |
Resource certification for mobile code; security and static analysis. |
Dr Rik Sarkar | Privacy preserving queries for location and trajectory data. Anonymity through clustering and aggregation. |
Prof Philip Wadler | Programming languages, functional languages, type systems, gradual types, session types, concurrency and distribution. |
Some of our PhD students
Member | Interests |
---|---|
Ibrahim Ahmed | Artificial intelligence and cyber security |
Sara S. Albakry | User privacy control in the Internet of Things. |
Kholoud Althobaiti | Usability of anti-phising approaches, particularly URL readability. |
Alexandru Cojocaru | Quantum computing |
Andrew Faulds | System Configuration language usability. |
Robert Flood | Data science and network security. |
Provenance for configuration language security. | |
Muhammad Ishaq | Cryptography, MPC and its applications, blockchain. |
Adam Jenkins | Usable software updating for system administrators. |
Dimitris Karakostas | Decentralized systems, cryptographic applications and software architecture. |
Dilara Kekulluoglu | Privacy and large scale data analysis. |
Thomas Kerber | Privacy, and computational models in cryptography. |
E-voting. | |
Yun Lu | Cryptography, differential privacy, provable security, blockchain. |
Konstantinos Mitropoulos | Cryptography and hardware, blockchains, applied security. |
Provable security of Bitcoin and cryptocurrency protocols. | |
Robust and energy-efficient context detection with smartphones. | |
Orfeas Stefanos Thyfronitis Litos | Cryptography, blockchains, decentralised trust & reputation. |
Incentives in cryptocurrencies. | |
Mohammad Tahaei | Usability of security APIs for software developers. |
Hendrik Waldner | Public-key cryptography, especially functional encryption. |
Some former staff members
Member | Interests |
---|---|
Prof Ross Anderson |
Security engineering, security economics, side channels, adversarial machine learning, security sustainability, protocols, payments, technology policy, cybercrime. |
Dr Liam O'Connor | Formal Specification and Verification, Programming Languages, Concurrency, Theorem Proving, Algorithmic Verification, Trustworthy Software Engineering |
Dr Kami Vaniea | Human factors of security and privacy, particularly focusing on supporting users in making good security decisions. |
Dr Maria Wolters | Privacy and security aspects of mHealth and eHealth, in particular usable security. |
Some PhD alumni
Member | Interests |
---|---|
David Butler | Formal verification of multi-party computation. |
Henry Clausen | Traffic microstructures and network anomaly detection. |
Sheung Chi (Arthur) Chan | Formal models of provenance information. |
Mina Doosti | Quantum cryptography and quantum cryptanalysis, quantum computing |
Alexandru Gheorghiu | Quantum cryptography. |
Andriana Gkaniatsou | Analysis of low-level implementations of cryptographic protocols. |
Joseph Hallett | Authorization logics. |
Yuhui Lin | Formal modelling and verification of network security. |
Marcin Szymczak | Application of programming language techniques in Bayesian reasoning. |
Galini Tsoukaneri | Narrow band cellular communications in the Internet of Things. |