Projects per year
Personal profile
Personal Statement
My security & privacy research concerns protocols used to connect devices and people in our digital society. I work to mitigate challenging threats where it is not obvious whether or not attackers can manipulate protocols so that they may, for instance, masquerade using someone elses identity or profile activities. A threat model precisely specifies the capabilities of attackers in such a way that logical methods may be employed to show the presence or absence of attack vectors.
I have a broad interest in interdisciplinary thinking that is required to solve real problems, for which we need to combine multiple methodologies in order to understand cyber threats and measures.
My personal website lays down several research directions in more detail. Notably it also explains my research in concurrency theory, which is important for understanding how to reason precisely about computing involving two or more parties, with protocols being a prime example.
Expertise related to UN Sustainable Development Goals
In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This person’s work contributes towards the following SDG(s):
Education/Academic qualification
Doctor of Philosophy, Programming Languages and Principles for Read-Write Linked Data, University of Southampton
Award Date: 23 Feb 2012
Bachelor of Arts, Computable Cyclic Functions, Oxford University
Award Date: 30 Sept 2005
External positions
research fellow, University of Luxembourg
1 Sept 2018 → 31 Aug 2023
senior research fellow, Nanyang Technological University
1 Nov 2015 → 31 Aug 2018
associate professor, Kazakh-British Technical University
1 Sept 2012 → 31 Oct 2015
research associate, Romanian Academy
1 Feb 2012 → 31 Aug 2012
Keywords
- security
- privacy
- authentication
- protocols
- verification
- proof theory
- Process calculi
- concurrency
- equivalence checking
- unlinkability
- Cyber Security
- Data Protection
- logic
- FinTech
Fingerprint
- 2 Similar Profiles
Collaborations and top research areas from the last five years
-
Gate 2 project on ePayments
Horne, R. (Principal Investigator)
15/07/24 → 30/06/25
Project: Internally funded project
-
Interoperable Non-Repudiation Protocol powered by DKGs
Horne, R. (Principal Investigator)
3/06/24 → 21/06/24
Project: Research Conference / Short Visit - attendance
-
Provably unlinkable smart card-based payments
Bursuc, S., Horne, R., Mauw, S. & Yurkov, S., 6 Sept 2023, Ithaca, NY, p. 1-32, 32 p.Research output: Working paper › Working Paper/Preprint
Open AccessFile -
Unlinkability of an improved key agreement protocol for EMV 2nd gen payments
Horne, R., Mauw, S. & Yurkov, S., 31 Oct 2022, 2022 IEEE 35th Computer Security Foundations Symposium, CSF 2022. Piscataway, NJ: IEEE, p. 364-379 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2022-August).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution book
6 Citations (Scopus)
Activities
-
COST DKG MC meeting
Horne, R. (Participant)
10 Sept 2024 → 11 Sept 2024Activity: Participating in or organising an event types › Participation in workshop, seminar, course
-
37th IEEE Computer Security Foundations Symposium
Horne, R. (Participant)
8 Jul 2024 → 12 Jul 2024Activity: Participating in or organising an event types › Participation in conference