Cas Cremers

Cas Cremers
Born 1974 (age 4142)
Geleen [1]
Nationality Dutch
Fields Computer Science, Computer Security
Institutions Oxford University
Alma mater Eindhoven University of Technology
Thesis Scyther - Semantics and Verification of Security Protocols (2006)
Doctoral advisor Sjouke Mauw
Other academic advisors Erik de Vink
Known for Scyther

Casimier Joseph Franciscus "Cas" Cremers (born 1974) is a computer scientist and professor of Information Security at the University of Oxford.[2][3] He is a member of the Department of Computer Science and the Cyber Security Centre[4] as well as a Governing Body Fellow of Kellogg College.[3]

Career

Cremers received his PhD from Eindhoven University of Technology in 2006. Between 2006 and 2013, he worked at the Information Security Group at ETH Zurich, Switzerland, until joining the University of Oxford in 2013. He was made full professor of Information Security in 2015.[5] His research focuses on information security, in particular the formal analysis of security protocols. This work ranges from developing mathematical foundations for protocol analysis to the development of analysis tools, notably the Scyther and Tamarin tools. Recently his research expanded into directions such as protocol standardisation, including the improvement of the ISO/IEC 9798 standard, and applied cryptography, leading to the development of new security requirements and protocols.[3]

Cremers previously worked in MSX computer game development, initially working for the Sigma Group before founding his own group Parallax; he is credited for work on nine different games, and many other demos, in a combination of roles including programmer, designer, composer, and writer.[6]

Publications

Cremers' publications cover security, cryptography, ISO standards, automated verification of security protocols, and formal methods.[7] His thesis was entitled "Scyther - Semantics and Verification of Security Protocols", and was supervised by Sjouke Mauw and Erik de Vink.[7] Also published with Sjouke Mauw is their book "Operational Semantics and Verification of Security Protocols".

References

External links

This article is issued from Wikipedia - version of the 6/29/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.