Naomi is currently working under the supervision of Prof. Jason Crampton
(Information Security) and Dr. Gregory Gutin (Computer Science). Her primary research interests are Key Assignment Schemes and Access Control mechanisms.
Following completion of his undergraduate degree in Computer Science at the University of Nottingham in 2003 he joined as an Officer in the Royal Air Force and served for 7 1/2 years. Following his departure from the service he worked for the Metropolitan Police in a security based role for the London Olympics. He was then employed by Direct Line Group to establish an Intelligence section during its divestment from Royal Bank of Scotland. He is interested in all areas of Cyber Security but in particular he is interested in the geopolitics of Cyber Security and the diferent and often contrasting approaches taken by nation states, businesses and hacktivist groups.
Was awarded a masters degree in Computer Science from the University of Oxford. His research interests are model checking, verification of security protocols and formal methods.
Thalia received a BSc in Mathematics at Imperial College London, followed by an MSc in Mathematics of Communications and Cryptography from Royal Holloway. Completed Maters dissertation on Combinatorial Designs and their application to Key Predistribution in Wireless Sensor Networks. Current research focuses on secret sharing schemes and their application.
He studied for a Masters of Engineering in Computer Systems and
Software Engineering at the University of York, graduating with Upper Second Class honours in 2013. He is currently supervised by Prof. Kostas Markantonakis. His research interests include Cryptography and Embedded System Security.
Graduated from Plymouth University with 1stclass honours in Computer Science. His research interests lie mainly in the area of software security, including reverse engineering, malware and vulnerability detection and exploitation.
His background is in Mathematics and Cryptography: he obtained a BSc in Mathematics from Warwick, and an MSc in the Mathematics of Cryptography and Communications from Royal Holloway.His interests primarily lie in the ways in which Maths can be applied to information security in new and novel ways. In particular, he has recently been looking at the use of lattices in cryptographic constructions.
Pip came to the CDT from a professional background in the police and the military. She has BA degrees in History and Politics (Liverpool) and English Literature (Open University), and a Masters in English from King's College London. Her research interests are in the agency of search algorithms and their effect on language and the wider discourse. Her thesis - entitled Language in the Age of Algorithmic Reproduction - will be jointly supervised by Keith Martin from the ISG and Pete Adey from the Geography department. Pip maintains a blog to accompany her research. Linguistic Geographies can be found here.
Thyla Van Der Merwe
Thyla received a BCom in Mathematics, Statistics and Economics, a BSc (Hons) in Mathematics and an MSc in Mathematics from the University of Cape Town, South Africa. She completed an MSc in Information Security at Royal Holloway as a FirstRand Laurie Dippenaar scholar before embarking on a PhD. Prior to starting at Royal Holloway, Thyla spent four years at an engineering firm, Tellumat (PTY) Ltd, as part of the security team. Thyla represented South Africa on the ISO/IEC JTC 1 SC 27 standards committee for five years, where her activities involved the standardization of cryptographic mechanisms and protocols. Thyla’s primary research focus is protocol analysis and she has recently completed two industry placements at the Mozilla Corporation (USA) where her work covered both Internet and messaging protocols.
Studied Pure Mathematics (Bsc) at Royal Holloway University of London, and graduated with a 1st Class Honours in 2013. He received the Thewlis/Wilks prize and an IMA prize in his final year for exceptional grades and effort. He is part of the CDT Cohort and his research interests include Key Management and Cryptographically Enforced Access Control, and the applications of such theory to cloud computing. He is currently supervised by Prof Jason Crampton. Before starting his PhD he worked at a software company as a Technical Business Analyst.