Past projects
Prioritizing Cybersecurity Controls based on Coverage of Attack Techniques
Automatic Visual Document Parsing
Privacy Preserving Machine Learning for Cyber Insurance
Secure Governance Schemes for Blockchains
Anonymization of Voice Recordings for Privacy-Preserving Emotional Analysis
Interactively exploring 3D scanned dynamic environments
Enhancing Document Processing with Hierarchical Structure
Quantum players in constructive cryptography
Security of Avionics Communication System
Formal Methods for Federated Identity Management
Critical Infrastructure Security
New Routing Approaches for Bike Deliveries
Access Control for Next Generation systems
Cryptographic Constructions of Randomness Resources
Analyzing and Maintaining Access Control Infrastructures
Data-usage Monitoring and Enforcement
SecMetrics: On Quantifying Operational Security
Modularity in Trusted Party Emulation
Methods for the Design, Analysis, and Certification of Secure Boot Processes
Security Proofs in Number-theoretic Cryptography
Methods for Evaluating Anomaly Detection Systems
Efficiency in Secure Multi-Party Computations
Cryptographically Faithful Proofs of Security Protocols
Security of Cryptographic Functions and Efficient Implementations
Methods for Automatic Analysis of Security Sensitive Protocols
Integrated Framework for Intrusion Management
Isolation and Recovery for Secure SDN
Robotic stacking of parcels in containers and roll cages
Manipulation of non-rigid e-commerce parcels
Improving Network Security Through Programmability