We have established a reputation as a trusted partner by our customers. Working closely with them, we tailor solutions to exactly what is needed within the budget available. This ranges from small-scale data exploration studies through to large-scale bespoke developments which deploy complex algorithms to deliver data intelligence to users.
We work with customers all over the world to deliver the solutions they need. Our staff have a wide range of expertise and experience, including with leading technology consultancies at senior level, so that we are capable of working from a strategic level down to technical project delivery. Clients range from multi-national corporates to SMEs, government and research agencies, and our engagements can last from days to longer-term strategic partnerships over many years.
Our approach is very much to build long-term, trusted relationships with our customers. We like to start with small scoping or feasibility studies to help understand our customer's requirements so that we can focus on exactly what is required and demonstrate value-for-money. These smaller studies can then lead to deeper interactions and larger-scale work once trust and concepts have been proven.
We have the expertise to undertake strategic studies, small-scale data exploration and solution feasibility studies, provide technology advice and bespoke training, develop mobile, desktop and cloud-based software solutions, or even to integrate and develop bespoke sensors.
See more case studies or news items
Alsadi, M., Casey, M., Dragan, C. C., Dupressoir, F., Riley, L., Sallal, M., Schneider, S. and Treharne, H., Wadsworth, J. and Wright, P. (2024) "Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems" IEEE Transactions on Dependable and Secure Computing
Budykho, K., Boureanu, I., Wesemeyer, S., Romero, D., Lewis, M., Rahulan, Y., Rajaona, F. and Schneider, S. (2023) "Fine-Grained Trackability in Protocol Executions" Network and Distributed System Security (NDSS) Symposium 2023
Miller, R., Boureanu, I., Wesemeyer, S., Newton, C.J.P. (2022) "The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation" Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
Manulis, M., Treharne, H., Newton, C., Casey, M.C. (2020) "Beyond Passwords: the Future of Web Authentication" New Statesman Spotlight: Cyber Security: Adapting to the Pandemic
Sallal, M., Schneider, S., Casey, M., Dragan, C., Dupressoir, F., Riley, L., Treharne, H., Wadsworth, J., Wright, P. (2019) "VMV: Augmenting an Internet Voting System with Selene Verifiability" arXiv:1912.00288 [cs.CR]
Whitefield, J., Casey, M.C, Chen, L., Giannetsos, T., Newton, C., Sasse, R., Treharne, H., Schneider, S., Wesemeyer, S. (2019) "Direct Anonymous Attestation in the Wild" Real World Crypto Symposium 2019 contributed talk Download
See more publications
If you want to discuss any of our MRV data products or capabilities, just...
Get in Touch