Security and Privacy by Design
Engineers now know how to build strong, but affordable bridges. They have learned from their mistakes over thousands of years. Cyber space is considerably more complex than even the most sophisticated bridge. We have hardly had the time to learn from our mistakes. We are on the road of trial and error now, hoping that we will eventually be able to design security and privacy in the same rigorous way that engineers design bridges.
Publications
Scientific Staff
![](https://filelist.tudelft.nl/_processed_/1/1/csm_SmaragdakisCV_da6d7ff27f.jpg)
Prof.dr.ir. George Smaragdakis
Internet Security, Internet Measurement, Web Privacy, Detection and Mitigation of Cyberattacks
![](https://filelist.tudelft.nl/_processed_/3/c/csm_Hadi_Asghari%5B1%5D_65124c4406_d421a151ae.jpg)
Dr. Hadi Asghari
Governance and economics of privacy, Empirical studies, Security reputation metrics
![](https://filelist.tudelft.nl/_processed_/a/5/csm_DOAA_fd1890ef29.jpg)
Dr. Doaa Elnakhala
Global Terrorism and Collective Moral Responsibility, Politics of the Middle East and North Africa, Border security and border barriers, Territorial, ethnic and other conflicts, The conflict in Syria, The Palestinian-Israeli conflict
<link tbm over-de-faculteit afdelingen values-technology-and-innovation people researchers dr-d-doaa-elnakhala _blank>Personal profile |
![](https://filelist.tudelft.nl/_processed_/9/5/csm_zeki_erkin_b7c618375a.jpg)
Dr. Zeki Erkin
Privacy Enhancing Technologies, Multi-party Computation, Applied Cryptography, Privacy engineering, Secure Signal Processing, Blockchain
![](https://filelist.tudelft.nl/_processed_/3/d/csm_prof_miller_0db797878b.jpg)
Prof.dr. Seumas Miller
Ethics of cyber warfare, privacy & confidentiality, collective responsibility
![](https://filelist.tudelft.nl/_processed_/f/9/csm_Jeroen%2520van%2520den%2520Hoven_582471981e_20090e48d6.jpg)
Prof.dr. Jeroen van den Hoven
Ethics of Technology, Computer Ethics, Value Sensitive Design, Responsible Innovation, Privacy
![](https://filelist.tudelft.nl/_processed_/3/1/csm_inald_lagendijk_7e8aeb26d6.jpg)
Prof.dr.ir. Inald Lagendijk
Privacy protected signal processing
![](https://filelist.tudelft.nl/_processed_/d/0/csm_johan_pouwelse_49917a0e1b.jpg)
Dr.ir. Johan Pouwelse
Secure and scalable distributed computing, blockchain
![](https://filelist.tudelft.nl/_processed_/0/1/csm_JanRellermeyer_093cfa873d.jpg)
Dr. Jan Rellermeyer
Secure and scalable distributed systems, Big data analytics, Secure middleware
![](https://filelist.tudelft.nl/_processed_/1/f/csm_jos%20weber_cced8488e9.jpg)
Dr.ir. Jos Weber
Network and channel coding
![](https://filelist.tudelft.nl/_processed_/0/e/csm_csm_Stefanie%20Roos_2b186854bb_72f116c8b3.jpg)
Dr. Stefanie Roos
Anonymous communication, Blockchain scalability
![](https://filelist.tudelft.nl/_processed_/c/5/csm_Martijn_Warnier%5B1%5D_293f99cc2d_3bdecda848.jpg)
Dr. Martijn Warnier
Systems Security, Privacy by Design, Vulnerability Assessment
PhDs
![](https://filelist.tudelft.nl/_processed_/b/8/csm_raymond_bierens_478ded46b3.jpg)
Drs. Raymon Bierens
Alignment of national cyber security strategies through social contract theory
![](https://filelist.tudelft.nl/_processed_/4/3/csm_jellev_0fe51953cf.jpg)
MSc Jelle Vos
Multi-party computation, cyber threat intelligence, private set operations
![](https://filelist.tudelft.nl/_processed_/5/a/csm_Feltes_%20Jonas%20Feltes_acd4a4230b.jpg)
MSc Jonas Feltes
Ethics of weapon technologies, Collective responsibility, Mass casualty terrorism Ethics of Counterterrorism, History of terrorism
![](https://filelist.tudelft.nl/_processed_/b/d/csm_Rene%20Mahieu_1f3a1f74e1_762785704e.jpg)
MSc René Mahieu
Economics and governance of privacy. Measurement of privacy policies.
![](https://filelist.tudelft.nl/_processed_/0/1/csm_marwankhabbaz-denoise-denoise_400143f1a8.jpg)
MSc Marwan Khabbaz
Internet of Medical Things, Machine Learning, Cyber Attacks, Authentication Schema
![](https://filelist.tudelft.nl/_processed_/8/0/csm_ROBBINS_0bee541d88.jpg)
MSc Scott Robbins
Ethics of Big Data, Robot Ethics
Personal profile |
![](https://filelist.tudelft.nl/_processed_/9/a/csm_quinten_stokkink_b53a9c2e28.png)
MSc Quinten Stokkink
Fast anonymous streaming with Tor-like onion routing
![](https://filelist.tudelft.nl/_processed_/e/b/csm_martijn_de_vos_9f23d5d0c4.jpeg)
Ir. Martijn de Vos
Blockchain-regulated marketplace to bid/ask/cancel bandwidth credits
![](https://filelist.tudelft.nl/_processed_/6/9/csm_Yi_Yin_d25e7b1573_fca732bb09.jpg)
Ir. Yi Yin
Privacy and trust enhancement mechanisms for data sharing
![](https://filelist.tudelft.nl/_processed_/5/3/csm_person_93de3bc2f5.jpg)
MSc F.W. Dekker
Privacy-enhancing technologies, Multi-party computation, Machine learning
![](https://filelist.tudelft.nl/_processed_/9/3/csm_ruiw_57a4be0934.jpg)