Boosting security with technology.

Security research


The Institute for Communication Systems is researching 5G security. Security is fundamental to the successful delivery of 5G networks across a wide range of industry verticals. In this research area they are investigating how 5G security is different from 2G, 3G, and 4G security in relation to requirements, threat landscape and solutions.


Surrey Law and Technology Hub are building algorithmic tools to understand better the law in action and to enable predicting court case outcomes with machine learning. Their planned activities involve both digitisation and publication of some types of court judgments.


Cryptography research by the Surrey Centre for Cyber Security is offering techniques to provide effective protection against the increasing cyber threat. Focuses include high-function encryption schemes and digital signatures, authentication and key exchange protocols, and cryptographic solutions for privacy-preserving identity management, secure data sharing and information exchange.


The Surrey Law and Technology Hub has also conducted research on cybersecurity. Cybersecurity is an increasingly important object of legal regulation as well as a key aspect of the practice of law. Their activities in this field involve both research and, in the near future, teaching.

Distributed ledger technologies

Surrey Blockchain has conducted research for their project, entitled VOLT, which aims to explore applications of distributed ledger technologies (DLT) in domains involving voting and collective decision making.

Blockchain enables us to keep tamper-proof data without relying on a centralised authority. Surrey’s Centre for Cyber Security and Centre for Vision, Speech and Signal Processing are conducting Blockchain and DLT research. Blockchain is leading the way in distributed ledger technology (DLT) research for the public good, with a broad portfolio of projects to enable greater trust online.

Privacy and authentication

Researchers at the Surrey Centre for Cyber Security are working on building privacy and authentication mechanisms into emerging technology in the rail and automotive transport sectors. Mobile communications are driving improved benefits for consumers across many sectors, but these services can pose challenges in terms of preserving privacy.

Security verification

Integrating formal guarantees into emerging technologies is being looked at by cyber security researchers. The security verification research – obtaining mathematical proof of the behaviour of systems and pieces of hardware – is embedded into many of the projects.

Contact our researchers active in this area

Mikolaj Barczentewicz profile image

Dr Mikolaj Barczentewicz

Predicting court case outcomes with machine learning; cybersecurity

Ioana Boureanu (Carlson) profile image

Professor Ioana Boureanu

5G tech-sec; automatic verification of complex privacy requirements in unbounded-size secure systems

John Collomosse profile image

Professor John Collomosse

Trust, authentication and privacy over a decentralised social registry

Haitham Cruickshank profile image

Dr Haitham Cruickshank

5G security; blockchains for internet of things

Brijesh Dongol profile image

Professor Brijesh Dongol

Verifiably correct transactional memory

Dr Mark Manulis

Trust, authentication and privacy over a decentralised social registry

Sotiris Moschoyiannis profile image

Dr Sotiris Moschoyiannis

Onward journey planning assistant

Steve Schneider profile image

Professor Steve Schneider

Voting on ledger technologies; boosting charitable donations