Our research
Content type
+
Downloads (441)
+
Events (396)
 
Groups (150)
+
News (2593)
 
People (803)
 
Projects (1066)
+
Publications (12004)
+
Videos (5237)
Labs
Research areas
Algorithms and theory47205 (81)
Communication and collaboration47188 (100)
Computational linguistics47189 (44)
Computational sciences47190 (79)
Computer systems and networking47191 (273)
Computer vision208594 (22)
Data mining and data management208595 (11)
Economics and computation47192 (20)
Education47193 (31)
Gaming47194 (42)
Graphics and multimedia47195 (132)
Hardware and devices47196 (93)
Health and well-being47197 (26)
Human-computer interaction47198 (285)
Machine learning and intelligence47200 (163)
Mobile computing208596 (8)
Quantum computing208597 (0)
Search, information retrieval, and knowledge management47199 (195)
Security and privacy47202 (86)
Social media208598 (6)
Social sciences47203 (100)
Software development, programming principles, tools, and languages47204 (191)
Speech recognition, synthesis, and dialog systems208599 (7)
Technology for emerging markets208600 (0)
1–25 of 86
Sort
Show 25 | 50 | 100
1234Next 
An Ironclad App lets a user securely transmit her data to a remote machine with the guarantee that every instruction executed on that machine adheres to a formal abstract specification of the app's behavior. This does more than eliminate implementation vulnerabilities such as buffer overflows, parsing errors, or data leaks; it tells the user exactly how the app will behave at all times.
Project details
Labs: Redmond
Zero-Effort Payments (ZEP) is a seamless mobile computing system designed to accept payments with no effort on the customer’s part beyond a one-time opt-in. With ZEP, customers need not present cards nor operate smartphones to convey their identities. ZEP uses three complementary identification technologies: face recognition, proximate device detection, and human assistance.
Project details
Labs: Redmond
We are looking for participants to engage in a personalised online shopping experience. You will receive a £40 shopping voucher for your participation and get the opportunity to purchase a book at 90% discount. The experiment involves a session of online shopping during which we will measure your eye movements and bodily responses. The shopping session is followed by an interview and we will ask you to fill out a final questionnaire to give us feedback on the study.
Project details
Labs: Cambridge
Project details
Labs: Redmond
JavaScript cryptographic algorithm implementations suitable for use in all cloud services
Project details
Labs: Redmond
We are exploring ways to reconcile (national) security and privacy through the use of advanced cryptography.
Project details
Labs: Redmond
Crowd-sourcing is increasingly being used for providing answers to online polls and surveys. However, existing systems, while taking care of the mechanics of attracting crowd workers, poll building, and payment, provide little that would help the survey-maker or pollster to obtain statistically significant results devoid of even the obvious selection biases. InterPoll: a platform for programming of crowd-sourced polls. Polls are expressed as embedded LINQ queries, whose results are provided to t
Project details
Labs: Redmond
In this work, we explore the properties of the global PKI as it exists in practice. We then leverage this information to construct flexible mechanisms that allow observers to fashion individualized policies to determine certificate trust.
Dhwani enables information theoretically secure Near Field Communication (NFC) on existing mobile phones without requiring any special hardware or PKI infrastructure. It uses existing microphones and speakers on phones to perform acoustic NFC.
Project details
Labs: India
We investigate how people's behaviour online can be characterized in terms of psychometric measurements such as the Big-5 personality traits openness, conscientiousness, extraversion, agreeableness, and neuroticism as well as general intelligence and satisfaction-with-life. We investigate patterns of Facebook usage, website preferences, query logs, and Facebook Likes and look for interesting correlations which can be used to predict users behaviours, preferences or characteristics.
Project details
Labs: Cambridge
Project details
Labs: Redmond
ZQL is a language and compiler that allows for client side compuations to be compiled with appropriate cryptographic checks to provide privacy and integrity.
Project details
Labs: Cambridge
The Web form is the primary mechanism for collecting personal information.
Project details
Labs: Cambridge
A new initiative to build networks of female researchers in different areas of mathematics, through Research Collaboration Conferences at math insitutes which focus on building collaboration groups consisting of senior and junior women in a given area.
Project details
Labs: Redmond
The performance of the elliptic curve method (ECM) for integer factorizationplays an important role in the security assessment of RSA-based protocols as a cofactorization tool inside the number field sieve. This webpage gives addition-subtracting chains to optimize Edwards ECM in terms of both performance and memory requirements. See for more details the "ECM at Work" paper.
One of the barriers to adoption cloud database technologies such as SQL Azure is data security and privacy. Data is a valuable asset to most organizations and storing the data in the cloud is often perceived as a security risk. This project investigates encryption as a mechanism to address such data security concerns. In particular, the goal of the project is to research, design, and build a comprehensive database system that supports encryption as a first class citizen.
Project details
Labs: India | Redmond
Mobile user experiences are enriched by applications that support disconnected operations to provide better mobility, availability, and response time. However, offline data access is at odds with security when the user is not trusted, especially in the case of mobile devices, which must be assumed to be under the full control of the user. Pasture leverages commodity trusted hardware to provide secure offline data access by untrusted users.
Project details
Labs: Redmond
U-Prove is an innovative cryptographic technology that allows users to minimally disclose certified information about themselves when interacting with online resource providers. U-Prove provides a superset of the security features of Public Key Infrastructure (PKI), and also provide strong privacy protections by offering superior user control and preventing unwanted user tracking.
In the last 25 years, Elliptic Curve Cryptography (ECC) has become a mainstream primitive for cryptographic protocols and applications. ECC has been standardized for use in key exchange and digital signatures. This project focuses on efficient generation of parameters and implementation of ECC and pairing-based crypto primitives, across architectures and platforms.
Project details
Labs: Redmond
Counterdog is an automated theorem prover for a counterfactual meta-logic on propositional Datalog. The prover is complete for the logic, and can prove (or disprove) counterfactual statements such as: "if 'p' is false in a Datalog program, but would be true if it contained 'a:-b', then 'b' is true in the program.". Counterdog is useful for reasoning about Datalog-based trust management languages. The theory and implementation were developed by Moritz Y. Becker and Nik Sultana.
Project details
Labs: Cambridge
Research on privacy concerns shows that the users are becoming more aware about third party tracking but have no effective means to deal with the issue. We have created a Cookie Tracker, an agent that watches the requests for cookie installations. It presents the user with online information about the sources of the cookies in question.
Project details
Labs: Cambridge
Curating verification problems and solutions for cryptographic software in C.
Project details
Labs: Cambridge
Outsourcing data streams and desired computations to a third party such as the cloud is practical for many companies due to overwhelming flow of information and excessively high resource requirements of their data stream applications. However, data outsourcing and remote computations intrinsically raise issues of trust, making it crucial to verify results returned by third parties. The SECOA project investigates techniques addressing this problem.
Project details
Labs: Redmond
Project details
Labs: Redmond
1–25 of 86
Sort
Show 25 | 50 | 100
1234Next 
> Our research