Academic staff working in Security, Privacy and Trust MemberInterestsDr Myrto ArapinisVerification of cryptographic protocols, verification of security properties, detection of attacks, formal models, and protocol composition.Prof David AspinallSoftware security and verification, network security and AI/ML methods, secure programming and formal methods for security.Dr Michele CiampiCryptography with emphasis on zero-knowledge protocol, secure multi-party computation, blockchain technology and non-malleable cryptographic protocol.Prof James CheneyProgramming languages, databases, logic/verification. Applications to provenance, scientific data management, and security.Dr Tariq ElahiBroadly, privacy-engineering for communication networks and distributed systems. Applied tools and methods for anti-surveillance, censorship resistance, anonymous communications, the Internet of behaviours, and secure and private next-generation communication technologies (e.g. Satellite Internet).Dr Marc JuarezNetwork traffic analysis, anonymous communications, applied machine learning to security and privacy, adversarial machine learning, and algorithmic bias.Prof Elham KashefiQuantum cryptography.Prof Aggelos KiayiasBroad perspective on cryptography and Cyber Security with emphasis on blockchain systems, e-voting protocols, digital content distribution, privacy and identity management.Dr Nadin KokciyanMulti-agent systems, computational argumentation, and privacy in social software.Dr Markulf KohlweissVerification of cryptographic implementations, cryptographic currencies and zero-knowledge proof systems, privacy and anti-surveillance, ethics in cryptography.Dr Jingjie LiUser-centric security and privacy: understanding human factors of security and privacy and designing more secure and private systems for emerging digital technologies.Dr Chris Xiaoxuan LuSafety and Reliability of Mobile Robotics, Side Channels in Internet of Things, Usable Biometrics for Wearables, Identity and Location Privacy, Mixed Reality.Dr Tiejun MaRisk and Decision Analytics.Prof Mahesh MarinaMobile authentication and privacy, and distributed intrusion detection.Dr Yuvraj PatelComputer systems including security in concurrency and operating systems.Prof Paul PatrasArtificial intelligence for network traffic analytics, performance optimisation, security and privacy, explainability, high-speed data stream processing.Dr Ian StarkMobile security and its verification. Formal models of systems and architecture, including security-oriented capability hardware.Dr Petros WalldenQuantum Cryptography, Quantum Computation and Quantum Information Theory.Dr Daniel WoodsEconomics of security and privacy focusing on cyber insurance, risk quantification and incident response. Affiliated staffMemberInterestsDr Stefano AlbrechtAutonomous agents and multi-agent systems, reasoning about the behaviour of interacting agents, applications to cyber security.Mr Paul AndersonSecure configuration and management of computing infrastructure.Prof Stuart AndersonDependable Systems. In particular socio-technical systems, resilience of such systems and how Social Science and Informatics provide a unique perspective on the conception, design, deployment and operation of computer-based systems.Dr Chris HeunenSemantics of quantum theory and programming languages; category theory; quantum logic; functional analysis.Prof Vijay NagarajanHardware/software support for reliability, availability, and security.Prof Gordon PlotkinAlgebraic specification and formal software development; correctness of modular systems; resource and security certification for mobile code; security and static analysis.Prof Ram RamamoorthyAutonomous robotics, Robot learning, Safe and Explainable Artificial Intelligence.Prof Michael RovatsosHuman-friendly AI approaches to privacy in data-driven collaborative Web systems. Value-sensitive algorithm design, fairness and transparency in collective intelligence applications.Prof Don SannellaResource certification for mobile code; security and static analysis.Dr Rik SarkarPrivacy preserving queries for location and trajectory data. Anonymity through clustering and aggregation.Prof Philip WadlerProgramming languages, functional languages, type systems, gradual types, session types, concurrency and distribution. Some of our PhD studentsMemberInterestsIbrahim AhmedArtificial intelligence and cyber security.Sara S. AlbakryUser privacy control in the Internet of Things.Kholoud AlthobaitiUsability of anti-phishing approaches, particularly URL readability.Alexandru CojocaruQuantum computing.Andrew FauldsSystem Configuration language usability.Robert FloodData science and network security.Weili FuProvenance for configuration language security.Muhammad IshaqCryptography, MPC and its applications, blockchain.Nikolaos LamprouE-voting.Yun LuCryptography, differential privacy, provable security, blockchain.Konstantinos MitropoulosCryptography and hardware, blockchains, applied security.Georgios PanagiotakosProvable security of Bitcoin and cryptocurrency protocols.Valentin RaduRobust and energy-efficient context detection with smartphones.Orfeas Stefanos Thyfronitis LitosCryptography, blockchains, decentralised trust & reputation.Aikaterini-Panagiota StoukaIncentives in cryptocurrencies.Hendrik WaldnerPublic-key cryptography, especially functional encryption.Lawrence PiaoBug bounty, security economics, software vulnerability.Temima HrleTechnology law, user perceptions, cyber insurance. Some former staff membersMemberInterestsProf Ross AndersonSecurity engineering, security economics, side channels, adversarial machine learning, security sustainability, protocols, payments, technology policy, cybercrime.Dr Liam O'ConnorFormal Specification and Verification, Programming Languages, Concurrency, Theorem Proving, Algorithmic Verification, Trustworthy Software Engineering.Dr Kami VanieaHuman factors of security and privacy, particularly focusing on supporting users in making good security decisions.Dr Maria WoltersPrivacy and security aspects of mHealth and eHealth, in particular usable security. Some PhD alumniMemberInterestsDavid ButlerFormal verification of multi-party computation.Henry ClausenTraffic microstructures and network anomaly detection.Sheung Chi (Arthur) ChanFormal models of provenance information.Mina DoostiQuantum cryptography and quantum cryptanalysis, quantum computing.Robert FloodNetwork Intrusion datasets and detection models, robustness and verification.Alexandru GheorghiuQuantum cryptography.Andriana GkaniatsouAnalysis of low-level implementations of cryptographic protocols.Joseph HallettAuthorization logics.Yuhui LinFormal modelling and verification of network security.Marcin SzymczakApplication of programming language techniques in Bayesian reasoning.Adam JenkinsUsable software updating for system administrators.Dimitris KarakostasDecentralized systems, cryptographic applications and software architecture.Dilara KekulluogluPrivacy and large scale data analysis.Thomas KerberPrivacy, and computational models in cryptography.Mikhail VolkhovMalleable Zero-Knowledge Proofs and Applications.Lorenzo MartinicoTrusted Execution for Private and Secure Computation: a Composable Approach. This article was published on 2024-11-22