National project

Verification of Voter Verifiable Voting Protocols

Over the last decade, online social networks (OSNs) have become one of the most popular online services. The analysis of social network data allows social scientists, market analysts, economists, among others, to understand societal phenomena, detect consumption patterns, assess the effect of policies, etc. Likewise, companies and public agencies can benefit from these studies to improve their decision-making processes and social outreach.

Verification of Voter-Verifiable Voting Protocols

We propose to use techniques from formal specification and verification of multi-agent systems, and apply them to verify information security requirements for voting protocols. In particular, we will look at various formalizations of confidentiality, coercion-resistance, and voter-verifiability in e-voting protocols. The research will lead to the development of a toolbox for practical verification of strategic properties in interaction protocols.

SEQUOIA - Security Properties, Process Equivalences and Automated Verification

The recently approved General Data Protection Regulation (GDPR) is expected to have a significant impact on the European Digital Single Market because it changes how enterprises have to protect individual’s personal data records. To keep their businesses up and running, and to avoid the high fines that the GDPR accounts for not being comply with its provisions, enterprises must be prepared to face the effects of the application of the regulation.

Cyber security within smart industry. The development of a risk model for increasing the cybersecurity of metal companies

A preliminary investigation by the Cybersecurity research group into SMEs shows that 39% of metal companies have become victims of a cyber attack. Because metal companies rely heavily on information technology (IT), the impact of such attacks is high. For example, directors of SMEs reported direct financial loss, loss or damage to data and loss of time.  Preliminary research shows that companies take too few measures to protect themselves. This is because existing risk models for cybersecurity - which have been developed for experts - are not suitable for managers in SMEs.

Cryptography in the Quantum Age

Quantum cryptography can provide security. Its best-known achievement is Quantum Key Distribution (QKD) which allows the generation of cryptographic keys based on the laws of quantum mechanics. However, modern cryptography studies a broad variety of other scenarios such as identification, secure collaboration, electronic voting, etc. that go far beyond the task of key distribution. For all these tasks, most of the classical protocols used today become insecure once an adversary is in possession of a quantum computer.

VIA NOVA - Car in the Cloud

The Netherlands is one of the most densely populated countries in Europe. Despite the excellent road network, The Netherlands is confronted with this density on a daily basis: the negative impact of traffic jams and incidents on travel times is growing by 38% the next 5 years. VIA NOVA will lay the necessary foundation for the next step of technological developments to overcome these negative impacts of congestion in future. This next step in technological developments is called Talking Traffic. Vehicles will communicate directly with the infrastructure and other road users and vice versa.

Pixel Privacy - Safer Multimedia Online

A growing danger is hidden in the volumes of video and images accumulated online. Using this large-scale pixel data, artificial intelligence algorithms can discover privacy-sensitive information about people, such as: location, personal possessions, socio-economic status, health state, psychological profile, and daily patterns. Currently, the sheer scale of data stored, and the frequency of data breaches makes visual privacy more important than ever.

TROPICS - Timely and RObust Patching of Industrial Control Systems

Industrial Control Systems (ICS/SCADA) control the most crucial resources in factories, powerplants, and production facilities. Safety and security for such systems is of the highest priority. Paradoxially, these systems are often among the worst protected against the latest cyber attacks. The problem is that even if an update is available, adminisitrators are reluctant to apply it, as bugs or unexpected side effects in the new code may jeopardize the very safety and stability of mission critical systems.

Deployment and Usability of Next-Generation Encryption for Network Security

Our digital society critically relies on protection of data and communication against espionage and cyber crime. Underlying all protection mechanisms is cryptography, which we are using daily to protect, for example, internet communication or e-banking.

Pages

News

SMESEC project Open Call for SMEs and SME associations
SMESEC has released an open call for SMEs and SME associations in order to validate SMESEC framework and at the same time improve their systems’ security.
 
SMESEC is inviting SMEs to participate in the validation of the SMESEC framework. By participating you not only have influence on the evaluation of the SMESEC framework, but also improve your own company security and get up to €20.000 of funds!

Future Events

CYBERUK 2019
24/04/2019 to 25/04/2019
Image:

CYBERUK is the UK government’s flagship cyber security event. Hosted by the National Cyber Security Centre (NCSC), it features world-class speakers, solutions and opportunities for interaction between the public and private sectors. You will be briefed on the evolving cyber threat and how we must respond as individuals and as a community to keep Britain safe in cyberspace.

CYBERUK 2019
24/04/2019 to 25/04/2019
Image:

Where: Scottish Event Campus (SEC), Glasgow
When: 24-25 April 2019
 
CYBERUK is the UK government’s flagship cyber security event. Hosted by the National Cyber Security Centre (NCSC), it features world-class speakers, solutions and opportunities for interaction between the public and private sectors. You will be briefed on the evolving cyber threat and how we must respond as individuals and as a community to keep Britain safe in cyberspace.