Security and Privacy by Design

Engineers now know how to build strong, but affordable bridges. They have learned from their mistakes over thousands of years. Cyber space is considerably more complex than even the most sophisticated bridge. We have hardly had the time to learn from our mistakes. We are on the road of trial and error now, hoping that we will eventually be able to design security and privacy in the same rigorous way that engineers design bridges.

Scientific Staff

Dr. Hadi Asghari

Governance and economics of privacy, Empirical studies, Security reputation metrics

Personal profile                                          

Dr. Zeki Erkin

Privacy Enhancing Technologies, Multi-party Computation, Applied Cryptography, Privacy engineering, Secure Signal Processing, Blockchain

Personal profile                                          

Prof.dr. Jeroen van den Hoven

Ethics of Technology, Computer Ethics, Value Sensitive Design, Responsible Innovation, Privacy

Personal profile                                          

Prof.dr.ir. Inald Lagendijk

Privacy protected signal processing

Personal profile                                          

Dr.ir. Jan van der Lubbe

Information theoretic security

Personal profile                                          

Prof.dr. Seumas Miller

Ethics of cyber warfare

Personal profile                                          

Dr.ir. Johan Pouwelse

Secure and scalable distributed computing, blockchain

Personal profile                                          

Dr. Martijn Warnier

Systems Security, Privacy by Design, Vulnerability Assessment

Personal profile                                          

Dr.ir. Jos Weber

Network and channel coding

Personal profile                                          

Dr. Phil Zimmermann

Secure VOIP communication, cryptography and data security, public policy aspects of privacy and surveillance

Personal profile                                          

Postdocs

Dr. Zhijie Ren

Information Theory, Blockchain, Consensus Models

Personal profile                                          

PhDs

Drs. Raymon Bierens

Alignment of national cyber security strategies through social contract theory

Personal profile                                          

MSc Oguzhan Ersoy

Multi-party Computation, Applied Cryptography, Privacy engineering

Personal profile                                          

MSc Laura Fichtner

Politics and ethics of surveillance and cybersecurity

Personal profile                                          

MSc Clara Maathuis

The impact of Cyber Warfare through cyber and military lenses

Personal profile                                          

MSc René Mahieu

Economics and governance of privacy. Measurement of privacy policies.

Personal profile                                          

MSc Majid Nateghizad

Multi-party Computation, Applied Cryptography, Privacy engineering

Personal profile                                          

MSc Quinten Stokkink

Fast anonymous streaming with Tor-like onion routing

Personal profile                                          

MSc Gamze Tillem

Multi-party Computation, Applied Cryptography, Privacy engineering

Personal profile                                          

MSc Chibuike Ugwuoke

Multi-party Computation, Applied Cryptography, Privacy engineering

Personal profile                                          

Ir. Martijn de Vos

Blockchain-regulated marketplace to bid/ask/cancel bandwidth credits

Personal profile                                          

Ir. Yi Yin

Privacy and trust enhancement mechanisms for data sharing

Personal profile