Usable Security

Security requirements come from people, individually or in wider society. And the effectiveness of security solutions often depends on the behaviour of people.

Explore More

User-Centered Security

User-centered security is about researching the best possible trade-offs and means to achieve good security that users are willing and able to use properly.

Explore More

Cryptography

In our current research, we focus on easy-to-use encryption tools for personal communication, designing and analyzing cryptographic primitives such as block and stream ciphers, public-key encryption schemes.

Explore More

Privacy Awareness

To educate the public, governments, and companies about both the techniques used and the outcomes of using them, and to make sure people demand more security and privacy since they would be aware that more is possible.

Explore More

Security Protocol

Study a wide variety of topics, from designing cryptographic protocols to the evaluation of their effectiveness to enable secure communication, such as key agreement protocols, key distribution schemes, secret sharing schemes,

Explore More

Security in Organization

Study a wide variety of topics from security assessment and audit. Provides many techniques used and the outcomes of using them.

Explore More

Discuss With Us