Any views expressed within media held on this service are those of the contributors, should not be taken as approved or endorsed by the University, and do not necessarily reflect the views of the University in respect of any particular issue.
The latest conversations, stories and opinions of the Blockchain Technology Lab
 
Cyber Security, Privacy, and Trust Research Showcase 2024 Recap

Cyber Security, Privacy, and Trust Research Showcase 2024 Recap

The Cyber Security, Privacy, and Trust Research Showcase 2024 brought together a diverse group of researchers, students, industry professionals, and government representatives to discuss the latest trends and research in cybersecurity, data privacy, and trustworthy systems. With around 50 participants, the event featured a series of informative talks and engaging poster sessions.

Here’s a recap of the event:

Speakers:

  • Prof. Aggelos Kiayias: Provided an overview of Cyber Security, Privacy, and Trust Research.
  • Amirreza Sarencheh: Discussed Central Bank Digital Currencies and Decentralized Identities.
  • Alec Dialo: Explored AI and Cyber Security.
  • Dimitris Karakostas: Introduced the Edinburgh Decentralisation Index.
  • Jan Bobolz: Delved into Notions of (Composable) Cryptographic Security.
  • Prof. Helen Hastie: Delivered an address as the Head of the School of Informatics.
  • Thomas Kerber: Highlighted the intersection of research and engineering in privacy-preserving smart contracts with his talk, “A Compact Made at Midnight – How Both Theory and Practice Lie.”
  • Misha Volkov: Shared insights on Zero-Knowledge Proofs with his talk, “ZK Proofs: Theory and Practice.”

Poster Presenters:

  • Lorenzo Martinico: Augmented Modelling of Globally Attested Trusted Execution
  • Kai Yao: Algorithmic Unfairness in Private Classifiers
  • Christina Ovezik: Blockchain Decentralisation: A Multi-layered Affair
  • Thomas Wong: Data Valuation for Decentralized ML Marketplaces
  • Lawrence Piao: Incentivizing Vulnerability Discovery Through Teaming and Collaboration
  • Sean Adamson: Parallel Remote State Preparation for Fully Device-independent Verifiable Blind Quantum Computation
  • Sándor Bartha: Quantitative Metrics for Cyber Essentials
  • Mohammad Vaziri: Automated Techniques for Cryptanalysis of Lightweight Cryptographic Algorithms
  • Tarini Saka: A Collaborative Human-AI Approach to Mitigate Phishing Attacks
  • Yu Xia: Efficient Secure Multi-party Computation
  • Neenu Garg: Meta – Embedding Privacy into the Network & Infrastructure
  • Robert Flood: Closing the Reality Gap: Synthetic Data Generation for Security
  • Shenando Stals and Manuel Maarek: Secrious Project Cybersecurity Cards
  • Kefan Chen and Mehdi Rizvi: Analysis of Ethnic Minorities’ Sentiment and Trust in Accessing Online Services

The event provided an opportunity to learn from leading experts and to network with peers. Topics covered included smart device privacy, blockchain decentralisation, digital identity, fairness and transparency in IT and AI, systems security, and privacy-preserving techniques.

For those who couldn’t attend or wish to revisit the event, our photo gallery offers a glimpse into the day’s activities.

We extend our gratitude to all participants, speakers, and poster presenters for contributing to the event’s success. Special thanks to our sponsor, SICSA, The Scottish Informatics & Computer Science Alliance, for their support.

Stay tuned for more events and updates in the field of cybersecurity, privacy, and trust.

Leave a Reply

Your email address will not be published. Required fields are marked *

css.php

Report this page

To report inappropriate content on this page, please use the form below. Upon receiving your report, we will be in touch as per the Take Down Policy of the service.

Please note that personal data collected through this form is used and stored for the purposes of processing this report and communication with you.

If you are unable to report a concern about content via this form please contact the Service Owner.

Please enter an email address you wish to be contacted on. Please describe the unacceptable content in sufficient detail to allow us to locate it, and why you consider it to be unacceptable.
By submitting this report, you accept that it is accurate and that fraudulent or nuisance complaints may result in action by the University.

  Cancel