We use cookies on this site. By browsing our site you agree to our use of cookies. Close this message Find out more

More in this section News

News

Monday 24th July 2017

Giovanni Cherubin Wins Best Student Paper at PETS 2017

Description
Giovanni Cherubin, a PhD student with the Royal Holloway CDT in Cyber Security, has won an "Andreas Pfitzmann Best Student Paper Award" at the Privacy Enhancing Technologies Symposium (PETS) 2017.
Date:
24/07/2017
Thursday 13th July 2017

New edition of Everyday Cryptography published

Description
The second edition of Everyday Cryptography by Prof. Keith Martin has just been published by Oxford University Press. This book grew from the core module Introduction to Cryptography on Royal Holloway's MSc Information Security, and is designed to introduce students and information security professionals to the subject, without requiring them to absorb the mathematical detail behind cryptography. The book can be read as a standalone guide, or used as the basis for an educational course (it includes supporting activities to further explore themes covered in each chapter).
Date:
13/07/2017

Computer Weekly 2017 information security thesis series: Unified Communication: It should work as easily as a telephone call!

Computer Weekly 2017 information security thesis series: Unified Communication: It should work as easily as a telephone call!
Description
Every year a number of the top graduates of the GCHQ accredited MSc Information Security programme contributes valuable white papers to the Information Security industry through a thesis series hosted by Computer Weekly. In the seventh article - "Unified Communication: It should work as easily as a telephone call!" of our Computer Weekly 2017 Royal Holloway Information Security thesis series, Thomas Reisinger examines security problems and solutions in various aspects of Unified Communication.The full MSc thesis from which the article is distilled is published on the Information Security Group's Technical Reports webpage.
Date:
13/07/2017
Wednesday 12th July 2017

Multos Collaboration with the Information Security Group at Royal Holloway University of London

Multos Collaboration with the Information Security Group at Royal Holloway University of London
Description
The MULTOS Consortium, a group of international blue chip organisations responsible for the promotion and development of the MULTOS specifications, announced today that it has helped create a new course for MSc students of the Information Security Group (ISG) at Royal Holloway, University of London (RHUL).
Date:
12/07/2017
Tuesday 11th July 2017

The ISG Review 2017

The ISG Review 2017
Description
The Information Security Group is pleased to announce the publication of the ISG Review 2017. The newsletter describes many of the ISG's research interests and explains the key activities of the ISG over the last year.
Date:
11/07/2017
Thursday 6th July 2017

Computer Weekly 2017 information security thesis series: The Investigatory Powers Act 2016 and Internet Connections Records: some surprising truths?

Computer Weekly 2017 information security thesis series: The Investigatory Powers Act 2016 and Internet Connections Records: some surprising truths?
Description
Every year a number of the top graduates of the GCHQ accredited MSc Information Security programme contributes valuable white papers to the Information Security industry through a thesis series hosted by Computer Weekly. In the sixth article - The Investigatory Powers Act 2016 and Internet Connections Records: some surprising truths- of our Computer Weekly 2017 Royal Holloway Information Security thesis series, Daniel Coats considers Internet Connection Records and the Investigatory Powers Act 2016, and how useful the Act might be in law enforcement and to what extent it intrudes upon individual privacy.
Date:
06/07/2017

WISDOM hosts Driving Innovation Through Diversity event

WISDOM hosts Driving Innovation Through Diversity event
Description
WISDOM hosts event with HutZero
Date:
06/07/2017
Wednesday 5th July 2017

ISG appoints Prof Martin Sadler and Prof Steve Babbage as Visiting Professors

ISG appoints Prof Martin Sadler and Prof Steve Babbage as Visiting Professors
Description
It is with much pleasure that we announce the appointment of Professor Martin Sadler and Professor Steve Babbage as Visiting Professors of the Information Security Group at Royal Holloway. Both Martin and Steve have a wealth of experience in many aspects of information security and we look forward to continuing our work with them.
Date:
05/07/2017

Registration open for the Smart Card and IoT Security Centre Open Day

Registration open for the Smart Card and IoT Security Centre Open Day
Description
Registration is now open for the Smart Card and Internet of Things Security Centre (SCC-IoT) Open Day which is due to be held on 30 August 2017 from 10am-4pm in the Picture Gallery at Royal Holloway, University of London. This is a free exhibition (50:50 mix of industry and student exhibitis) that acts as a relaxed networking and exhibition event for its sponsors, supporters and industry lecturers plus honoured guests and students (some will be looking for jobs!). The Open Day includes practical demonstrations of products and technology, some short sound-bite presentations from industry/government/academic experts plus a prestige lecture from a distinguished guest.
Date:
05/07/2017
Thursday 29th June 2017

New edition of Smart Cards, Tokens, Security and Applications published

New edition of Smart Cards, Tokens, Security and Applications published
Description
The 2nd edition of Smart Cards, Tokens, Security and Applications, edited by Professor Keith Mayes and Professor Konstantinos Markantonakis of the Information Security Group has now been published.This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application.
Date:
29/06/2017
Displaying 1 to 10 of 121
Previous 1 2 3 4 5 Next
 
 
 

Comment on this page

Did you find the information you were looking for? Is there a broken link or content that needs updating? Let us know so we can improve the page.

Note: If you need further information or have a question that cannot be satisfied by this page, please call our switchboard on +44 (0)1784 434455.

This window will close when you submit your comment.

Add Your Feedback
Close