People
Academic staff working in Security, Privacy and Trust
| Member | Interests |
|---|---|
| Prof Ross Anderson |
Security engineering, security economics, side channels, adversarial machine learning, security sustainability, protocols, payments, technology policy, cybercrime. |
| Dr Myrto Arapinis | Verification of cryptographic protocols, verification of security properties, detection of attacks, formal models, and protocol composition. |
| Prof David Aspinall | Software security, user authentication, theorem proving, programming and specification languages. |
| Dr Michele Ciampi | Cryptography with emphasis on zero-knowledge protocol, secure multi-party computation, blockchain technology and non-malleable cryptographic protocol. |
| Prof James Cheney | Programming languages, databases, logic/verification. Applications to provenance, scientific data management, and security. |
| Dr Liam O'Connor | Formal Specification and Verification, Programming Languages, Concurrency, Theorem Proving, Algorithmic Verification, Trustworthy Software Engineering |
| Dr Tariq Elahi | Anonymous communications, censorship resistance, and the internet of things. |
| Dr Marc Juarez |
Network traffic analysis, anonymous communications, applied machine learning to security and privacy, adversarial machine learning, and algorithmic bias. |
| Prof Elham Kashefi | Quantum cryptography. |
| Prof Aggelos Kiayias | Broad perspective on cryptography and Cyber Security with emphasis on blockchain systems, e-voting protocols, digital content distribution, privacy and identity management. |
| Dr Nadin Kokciyan | Multi-agent systems, computational argumentation, and privacy in social software. |
| Dr Markulf Kohlweiss |
Verification of cryptographic implementations, cryptographic currencies and zero-knowledge proof systems, privacy and anti-surveillance, ethics in cryptography |
| Dr Jingjie Li | User-centric security and privacy: understanding human factors of security and privacy and designing more secure and private systems for emerging digital technologies. |
| Dr Chris Xiaoxuan Lu | Safety and Reliability of Mobile Robotics, Side Channels in Internet of Things, Usable Biometrics for Wearables, Identity and Location Privacy, Mixed Reality. |
| Dr Tiejun Ma | Risk and Decision Analytics |
| Prof Mahesh Marina | Mobile authentication and privacy, and distributed intrusion detection. |
| Dr Yuvraj Patel | Computer systems including security in concurrency and operating systems. |
| Dr Paul Patras | Performance optimisation in wireless networks, network protocols and architectures, prototyping and test beds. Current research interests include security and privacy of IoT systems. |
| Dr Ian Stark | Mobile security and its verification. Formal models of systems and architecture, including security-oriented capability hardware. |
| Dr Kami Vaniea | Human factors of security and privacy, particularly focusing on supporting users in making good security decisions. |
| Dr Petros Wallden | Quantum Cryptography, Quantum Computation and Quantum Information Theory. |
| Dr Daniel Woods | Economics of security and privacy focusing on cyber insurance, risk quantification and incident response. |
Affiliated staff
| Member | Interests |
|---|---|
| Dr Stefano Albrecht | Autonomous agents and multi-agent systems, reasoning about the behaviour of interacting agents, applications to cyber security. |
| Mr Paul Anderson | Secure configuration and management of computing infrastructure. |
| Prof Stuart Anderson | Dependable Systems. In particular socio-technical systems, resilience of such systems and how Social Science and Informatics provide a unique perspective on the conception, design, deployment and operation of computer-based systems. |
| Dr Chris Heunen | Semantics of quantum theory and programming languages; category theory; quantum logic; functional analysis. |
| Prof Vijay Nagarajan |
Hardware/software support for reliability, availability, and security. |
| Prof Gordon Plotkin | Algebraic specification and formal software development; correctness of modular systems; resource and security certification for mobile code; security and static analysis. |
| Prof Ram Ramamoorthy | Autonomous robotics, Robot learning, Safe and Explainable Artificial Intelligence. |
| Prof Michael Rovatsos | Human-friendly AI approaches to privacy in data-driven collaborative Web systems. Value-sensitive algorithm design, fairness and transparency in collective intelligence applications. |
| Prof Don Sannella |
Resource certification for mobile code; security and static analysis. |
| Dr Rik Sarkar | Privacy preserving queries for location and trajectory data. Anonymity through clustering and aggregation. |
| Prof Philip Wadler | Programming languages, functional languages, type systems, gradual types, session types, concurrency and distribution. |
| Dr Maria Wolters | Privacy and security aspects of mHealth and eHealth, in particular usable security. |
Some of our PhD students
| Member | Interests |
|---|---|
| Ibrahim Ahmed | Artificial intelligence and cyber security |
| Sara S. Albakry | User privacy control in the Internet of Things. |
| Kholoud Althobaiti | Usability of anti-phising approaches, particularly URL readability. |
| Alexandru Cojocaru | Quantum computing |
| Andrew Faulds | System Configuration language usability. |
| Robert Flood | Data science and network security. |
| Provenance for configuration language security. | |
| Muhammad Ishaq | Cryptography, MPC and its applications, blockchain. |
| Adam Jenkins | Usable software updating for system administrators. |
| Dimitris Karakostas | Decentralized systems, cryptographic applications and software architecture. |
| Dilara Kekulluoglu | Privacy and large scale data analysis. |
| Thomas Kerber | Privacy, and computational models in cryptography. |
| E-voting. | |
| Yun Lu | Cryptography, differential privacy, provable security, blockchain. |
| Konstantinos Mitropoulos | Cryptography and hardware, blockchains, applied security. |
| Provable security of Bitcoin and cryptocurrency protocols. | |
| Robust and energy-efficient context detection with smartphones. | |
| Orfeas Stefanos Thyfronitis Litos | Cryptography, blockchains, decentralised trust & reputation. |
| Incentives in cryptocurrencies. | |
| Mohammad Tahaei | Usability of security APIs for software developers. |
| Hendrik Waldner | Public-key cryptography, especially functional encryption. |
Some PhD alumni
| Member | Interests |
|---|---|
| David Butler | Formal verification of multi-party computation. |
| Henry Clausen | Traffic microstructures and network anomaly detection. |
| Sheung Chi (Arthur) Chan | Formal models of provenance information. |
| Mina Doosti | Quantum cryptography and quantum cryptanalysis, quantum computing |
| Alexandru Gheorghiu | Quantum cryptography. |
| Andriana Gkaniatsou | Analysis of low-level implementations of cryptographic protocols. |
| Joseph Hallett | Authorization logics. |
| Yuhui Lin | Formal modelling and verification of network security. |
| Marcin Szymczak | Application of programming language techniques in Bayesian reasoning. |
| Galini Tsoukaneri | Narrow band cellular communications in the Internet of Things. |
