Understanding, Measuring and Improving the Security of Collaboration Tools
Exploring the usability of collaboration tools in the context of anonymous communications, through a combination of theoretical, qualitative and quantitative methods.
Please also see the listing of our current projects.
Exploring the usability of collaboration tools in the context of anonymous communications, through a combination of theoretical, qualitative and quantitative methods.
Key2Kindness is an interdisciplinary project exploring the role of proactive content moderation systems to reduce instances of online harassment across both privacy and public online social platforms.
Consumer protection for financial payment allows individuals to have confidence that electronic transactions are safe, but also plays a critical role in reducing levels of fraud. Through assigning responsibility for reimbursement to the party in the best position to prevent crime, consumer protection rules supports investment in fraud-prevention technology. However liability engineering can only be effective if rules are fair and implementation is transparent. This project applies privacy enhancing technologies to ensure that consumer protection is working properly, while protecting the privacy of payment system participants.
ingo is the first efficient distributed key generation algorithm that is secure against an adaptive adversary and works in an asynchronous network.
A joint project between Privitar, UCL and Cardiff University on applying privacy-preserving federated machine learning to financial crime prevention. The project was awarded first place in the UK-US privacy enhancing technologies prize challenge.
This project explores the usability of privacy mechanisms within female mHealth apps, focusing on features that allow users to manage their data such as deletion and data portability mechanisms.
Protecting (Young) Victims of Cryptocurrency Fraud through decentralised insurance markets
This project will lead to advances in our understanding of how perpetrators of child sexual grooming engage online with young people through computer-mediated communication tools and platforms (e.g., Facebook, WhatsApp).