The research projects and collaborations listed below represent several different directions, topics, and faculty researchers. Additionally, they are examples of high-impact research in all of these areas.
Cloud Security

Cryptography
Privacy
Algorithms & Society
Previous Research
Research Direction | Topics | Point of Contact |
---|---|---|
Cryptography | New Directions in Cryptography | Dr. Ran Canetti, CAS, Computer Science |
Network Reliability | Detecting and understanding anomalies in IP networks | Drs. Assaf Kfoury, Mark Crovella, CAS, Computer Science |
Network Safety | Transient Reduction of Quality Attacks on the Internet | Drs. Azer Bestavros and Ibrahim Matta, CAS, Computer Science |
Economic Approaches | Economic models for thwarting spam | Dr. Marshall Van Alstyne, Department of Information Systems, Questrom School of Business |
Network Reliability | Detecting and understanding anomalies in IP networks | Drs. Assaf Kfoury, Mark Crovella, CAS, Computer Science |
Network Safety | Transient Reduction of Quality Attacks on the Internet | Drs. Azer Bestavros and Ibrahim Matta, CAS, Computer Science |
Network security | Internet security, intrusion resilience, interactive passwordschemes secure multicast & group key management protocols | Drs. Gene Itkis and Leo Reyzin, Applied Cryptography and Electronic Security Group, College of Arts and Sciences, Computer Science Department |
Trustworthy software | Software assurance and reliability using automatic verification | Dr. Azer Bestavros. College of Arts and Sciences, Computer Science Department |
Algorithm development | Development and analysis if randomized algorithms for optimization in computational chemistry and physics | Drs. Steve Homer and Shang-hua Teng, College of Arts and Sciences, Computer Science Department |
Randomized computation | One-way functions, average case complexity | Dr. Leonid Levin, College of Arts and Sciences, Computer Science Department |
Data mining and indexing | Spatio-temporal indexing of large data sets | Dr. George Kollios, College of Arts and Sciences, Computer Science Department |
Biometrics in enterprise computing systems | Integrating biometrics (face, iris, signature) in enterprise computing systems | Drs. Tanya Zlateva, Lou Chitkushev, Suresh Kalathur, Metropolitan College, Computer Science Department |
Trustworthy hardware | Side-channel attack-resistant cryptographic devices. Design methodology based on robust codes and asynchronous circuitry. | Drs. Mark Karpovsky and Alexander Taubin, College of Engineering, ECE Department |
Data modeling of spatio-temoral sets | Semantic modeling of video databases | Dr. Thomas Little, College of Engineering, ECE Department |
Design and evaluation of computer network architecture | Ad hoc network and sensor network research including algorithms, protocols, and proof of concept | Dr. Thomas Little, College of Engineering, ECE Department |
Information theoretic applications | Data reconciliation, robust location detection | Dr. Ari Trachtenberg, Laboratory for Networking and Information Systems, College of Engineering, ECE Department |
Network Stability | Statistical analysis and simulation of instability, phenomena in wired and wireless networks | Dr. David Starobinski, Laboratory for Networking and Information Systems, College of Engineering, ECE Department |
Embedded Security Processors | Customized instruction set for security processing | Dr. Wei Qin, College of Engineering, ECE Department |
Cloud Computation | Collaborative: MACS: A Modular Approach to Cloud Security | Dr. Ran Canetti, CAS, Computer Science |