Academic staff working in Security, Privacy and Trust
|Prof Ross Anderson
Security engineering, security economics, side channels, adversarial machine learning, security sustainability, protocols, payments, technology policy, cybercrime.
|Dr Myrto Arapinis
|Verification of cryptographic protocols, verification of security properties, detection of attacks, formal models, and protocol composition.
|Prof David Aspinall
|Software security, user authentication, theorem proving, programming and specification languages.
|Dr Michele Ciampi
|Cryptography with emphasis on zero-knowledge protocol, secure multi-party computation, blockchain technology and non-malleable cryptographic protocol.
|Prof James Cheney
|Programming languages, databases, logic/verification. Applications to provenance, scientific data management, and security.
|Dr Liam O'Connor
|Formal Specification and Verification, Programming Languages, Concurrency, Theorem Proving, Algorithmic Verification, Trustworthy Software Engineering
|Dr Tariq Elahi
|Anonymous communications, censorship resistance, and the internet of things.
|Dr Marc Juarez
Network traffic analysis, anonymous communications, applied machine learning to security and privacy, adversarial machine learning, and algorithmic bias.
|Prof Elham Kashefi
|Prof Aggelos Kiayias
|Broad perspective on cryptography and Cyber Security with emphasis on blockchain systems, e-voting protocols, digital content distribution, privacy and identity management.
|Dr Nadin Kokciyan
|Multi-agent systems, computational argumentation, and privacy in social software.
|Dr Markulf Kohlweiss
Verification of cryptographic implementations, cryptographic currencies and zero-knowledge proof systems, privacy and anti-surveillance, ethics in cryptography
|Dr Jingjie Li
|User-centric security and privacy: understanding human factors of security and privacy and designing more secure and private systems for emerging digital technologies.
|Dr Chris Xiaoxuan Lu
|Safety and Reliability of Mobile Robotics, Side Channels in Internet of Things, Usable Biometrics for Wearables, Identity and Location Privacy, Mixed Reality.
|Dr Tiejun Ma
|Risk and Decision Analytics
|Prof Mahesh Marina
|Mobile authentication and privacy, and distributed intrusion detection.
|Dr Yuvraj Patel
|Computer systems including security in concurrency and operating systems.
|Dr Paul Patras
|Performance optimisation in wireless networks, network protocols and architectures, prototyping and test beds. Current research interests include security and privacy of IoT systems.
|Dr Ian Stark
|Mobile security and its verification. Formal models of systems and architecture, including security-oriented capability hardware.
|Dr Kami Vaniea
|Human factors of security and privacy, particularly focusing on supporting users in making good security decisions.
|Dr Petros Wallden
|Quantum Cryptography, Quantum Computation and Quantum Information Theory.
|Dr Daniel Woods
|Economics of security and privacy focusing on cyber insurance, risk quantification and incident response.
|Dr Stefano Albrecht
|Autonomous agents and multi-agent systems, reasoning about the behaviour of interacting agents, applications to cyber security.
|Mr Paul Anderson
|Secure configuration and management of computing infrastructure.
|Prof Stuart Anderson
|Dependable Systems. In particular socio-technical systems, resilience of such systems and how Social Science and Informatics provide a unique perspective on the conception, design, deployment and operation of computer-based systems.
|Dr Chris Heunen
|Semantics of quantum theory and programming languages; category theory; quantum logic; functional analysis.
|Prof Vijay Nagarajan
Hardware/software support for reliability, availability, and security.
|Prof Gordon Plotkin
|Algebraic specification and formal software development; correctness of modular systems; resource and security certification for mobile code; security and static analysis.
|Prof Ram Ramamoorthy
|Autonomous robotics, Robot learning, Safe and Explainable Artificial Intelligence.
|Prof Michael Rovatsos
|Human-friendly AI approaches to privacy in data-driven collaborative Web systems. Value-sensitive algorithm design, fairness and transparency in collective intelligence applications.
|Prof Don Sannella
Resource certification for mobile code; security and static analysis.
|Dr Rik Sarkar
|Privacy preserving queries for location and trajectory data. Anonymity through clustering and aggregation.
|Prof Philip Wadler
|Programming languages, functional languages, type systems, gradual types, session types, concurrency and distribution.
|Dr Maria Wolters
|Privacy and security aspects of mHealth and eHealth, in particular usable security.
Some of our PhD students
|Artificial intelligence and cyber security
|Sara S. Albakry
|User privacy control in the Internet of Things.
|Usability of anti-phising approaches, particularly URL readability.
|System Configuration language usability.
|Data science and network security.
|Provenance for configuration language security.
|Cryptography, MPC and its applications, blockchain.
|Usable software updating for system administrators.
|Decentralized systems, cryptographic applications and software architecture.
|Privacy and large scale data analysis.
|Privacy, and computational models in cryptography.
|Cryptography, differential privacy, provable security, blockchain.
|Cryptography and hardware, blockchains, applied security.
|Provable security of Bitcoin and cryptocurrency protocols.
|Robust and energy-efficient context detection with smartphones.
|Orfeas Stefanos Thyfronitis Litos
|Cryptography, blockchains, decentralised trust & reputation.
|Incentives in cryptocurrencies.
|Usability of security APIs for software developers.
|Public-key cryptography, especially functional encryption.
Some PhD alumni
|Formal verification of multi-party computation.
|Traffic microstructures and network anomaly detection.
|Sheung Chi (Arthur) Chan
|Formal models of provenance information.
|Quantum cryptography and quantum cryptanalysis, quantum computing
|Analysis of low-level implementations of cryptographic protocols.
|Formal modelling and verification of network security.
|Application of programming language techniques in Bayesian reasoning.
|Narrow band cellular communications in the Internet of Things.