The following people from across the University are affiliated with UoE CSPR.
This list is not updated frequently, it includes academic teaching members of staff only. There are many postdoctoral researchers, PhD and undergraduate students who are also members of the network and are on our mailing list.
If you'd like to be included on this list, please contact us with a note of your interests.
There are also connected research groups based in particular Schools, particularly Security and Privacy at UoE Informatics.
|Mr Paul Anderson||Large infrastructure mangagement; configuration languages, including provenance and security.|
|Prof Stuart Anderson||Design and analysis of complex systems; risks in socio-technical systems.|
|Dr Myrto Arapinis||Logical foundations of computer security and privacy.|
|Prof David Aspinall||Software security and verification; usable security and authentication.|
|Dr Angus Bancroft||Sociology of cyber-criminal markets, techno-politics of anonymity.|
|Prof Alan Bundy||Application of automated reasoning to verify, disprove or reverse engineer security-critical programs.|
|Dr James Cheney||Programming languages, provenance security, database access control and language-integrated query.|
|Prof Mike Davies||Imaging and signal processing; detection, classification and signal separation for surveillance.|
|Prof Wenfei Fan||Access control security for structured data in XML; data cleaning.|
|Prof Andrew D. Gordon||Programming language-based security; protocol verification; language-based probablistic models.|
|Prof Harald Haas||Wireless system engineering and digital signal processing, especially optical and hybrid optical-RF.|
|Dr Ewa Luger||Applied ethics: data governance, consent, privacy and making intelligent systems intelligible to the user.|
|Prof Elham Kashefi||Delegated classical and quantum computing; cloud computing verification; post-quantum cryptography.|
|Prof Aggelos Kiayias||Applied cryptography, including foundations and applications of block chain technology.|
|Dr Mahesh Marina||
Mobile authentication and privacy, and distributed intrusion detection.
|Dr Andrew Neal||
Security policy, politics and scrutiny, and their expansion over time.
|Prof Dave Robertson||
Security and privacy and trust and reputation in distributed systems and social computation.
|Dr Michael Rovatsos||Reputation in multiagent systems; restricted information sharing in distributed data mining.|
|Prof Tharm Ratnarajah||Wireless communications, information theory, physical layer security, 5G and wide-area IoT.|
|Prof Charles Raab||Public policy, governance and regulation for information privacy, surveillance and security, and identity.|
|Prof Don Sannella||Formal methods for secure systems development, using algebraic and mechanised reasoning.|
|Dr Rik Sarkar||
Distributed and wireless routing protocols and attacks; location privacy.
|Prof Burkhard Schafer||Legal concepts of privacy and security and their computational implementation; legal forensics.|
|Prof Chris Speed||Designing provocative interventions to support usable security, or highlight user risks.|
|Dr Ian Stark||Mobile security and its verification; formal models of systems, including security-oriented capability hardware.|
|Dr Charles Sutton||Machine learning, Applications to software engineering, programming languages, and computer security.|
|Prof Philip Wadler||Programming language design and foundations that support better security, especially using types.|
|Dr Petros Wallden||Quantum cryptography, especially quantum digital signatures; quantum theory foundations.|
|Dr Kami Vaniea||Usable privacy and security, applying human computer interaction (HCI) to security and privacy.|
|Dr Maria Wolters||Private and secure eHealth.|