Cyber Security

Protecting data and systems is paramount to maintaining a working business, yet advances in computational power and the ingenuity of hackers means that cyber security is getting harder and harder. We have experience of implementing leading-edge cryptographic protocols in mobile and cloud-based solutions for authentication and verification, and in using blockchain technologies.

Advanced Design

Working with emerging technologies is challenging. Having research and commercial experience allows us to bring a deep understanding of systems design to enable new and complex technologies to be deployed in robust, well-designed solutions.

Related News

Related Projects

Related Clients, Partners and Funders

Related Publications, Talks and Videos

  1. Whitefield, J., Casey, M.C, Chen, L., Giannetsos, T., Newton, C., Sasse, R., Treharne, H., Schneider, S., Wesemeyer, S. (2019). Direct Anonymous Attestation in the Wild. Real World Crypto Symposium 2019 contributed talk.
  2. Casey, M.C. & Wesemeyer, S. (2018). Benchmarking ETicketing System. Source code for evaluating NFC e-ticketing protocols.