
Security
Boosting security with technology.
Security research
5G
The Institute for Communication Systems is researching 5G security. Security is fundamental to the successful delivery of 5G networks across a wide range of industry verticals. In this research area they are investigating how 5G security is different from 2G, 3G, and 4G security in relation to requirements, threat landscape and solutions.
Algorithms
Surrey Law and Technology Hub are building algorithmic tools to understand better the law in action and to enable predicting court case outcomes with machine learning. Their planned activities involve both digitisation and publication of some types of court judgments.
Cryptography
Cryptography research by the Surrey Centre for Cyber Security is offering techniques to provide effective protection against the increasing cyber threat. Focuses include high-function encryption schemes and digital signatures, authentication and key exchange protocols, and cryptographic solutions for privacy-preserving identity management, secure data sharing and information exchange.
Cybersecurity
The Surrey Law and Technology Hub has also conducted research on cybersecurity. Cybersecurity is an increasingly important object of legal regulation as well as a key aspect of the practice of law. Their activities in this field involve both research and, in the near future, teaching.
Distributed ledger technologies
Surrey Blockchain has conducted research for their project, entitled VOLT, which aims to explore applications of distributed ledger technologies (DLT) in domains involving voting and collective decision making.
Blockchain enables us to keep tamper-proof data without relying on a centralised authority. Surrey’s Centre for Cyber Security and Centre for Vision, Speech and Signal Processing are conducting Blockchain and DLT research. Blockchain is leading the way in distributed ledger technology (DLT) research for the public good, with a broad portfolio of projects to enable greater trust online.
Privacy and authentication
Researchers at the Surrey Centre for Cyber Security are working on building privacy and authentication mechanisms into emerging technology in the rail and automotive transport sectors. Mobile communications are driving improved benefits for consumers across many sectors, but these services can pose challenges in terms of preserving privacy.
Security verification
Integrating formal guarantees into emerging technologies is being looked at by cyber security researchers. The security verification research – obtaining mathematical proof of the behaviour of systems and pieces of hardware – is embedded into many of the projects.
Contact our researchers active in this area

Dr Mikolaj Barczentewicz
Predicting court case outcomes with machine learning; cybersecurity

Professor Ioana Boureanu
5G tech-sec; automatic verification of complex privacy requirements in unbounded-size secure systems

Professor Liqun Chen
Global authority on cryptography

Professor John Collomosse
Trust, authentication and privacy over a decentralised social registry

Dr Haitham Cruickshank
5G security; blockchains for internet of things

Professor Brijesh Dongol
Verifiably correct transactional memory

Dr Mark Manulis
Trust, authentication and privacy over a decentralised social registry

Dr Sotiris Moschoyiannis
Onward journey planning assistant

Professor Steve Schneider
Voting on ledger technologies; boosting charitable donations

Professor Zhili Sun
5G tech-sec

Professor Helen Treharne
Data to improve the customer experience