- Cyber Security Challenges and Opportunities in the Context of Pakistan - 2015-03-04
- Papers presented in ICOSST held at UET Lahore - 2014-12-18
- A Journal Paper Accepted in The computer Journal, Oxford Journals - 2014-12-08
- SpringerOpen journal Paper published - 2014-11-11
- NUST Intra Research Conference - 2014-11-08
KTH- Applied Information Security (AIS) lab is a joint effort of NUST School of Electrical Engineering & Computer Science (SEECS), Pakistan and Royal Institute of Technology (KTH), Sweden. It was established in August 2010 to facilitate basic and applied research in multi-disciplinary areas within information and network security. The lab aims to provide high-tech workforce by providing security trainings to undergraduate and post-graduate students and offer security services to industry by promoting new technologies. The lab's research is at the forefront of areas ranging from identity management systems, secure cloud virtualization, cross-domain trust management, secure voting, unstructured database security, web security, cryptography, network security, and software security.
'Our mission is to help industries, governments and academic institutes by satisfying their security and privacy need through innovative and reliable security solutions.'
'Our vision is to bridge the gap between cutting edge research and information security problems through the implementation of quality security projects and to prepare the next-generation security experts for upcoming security challenges and high-impact security areas such as cloud computing.'
Our research is aimed at design and development of innovative security solutions to ensure the safety of information systems and infrastructures. We emphasize towards secure applications development and systems that solve real world problems. Our strategy is to achieve high quality in products by applying world-recognized standards and technologies. We are interested in pursuing research and development in the following security domains: cloud computing security, database security, digital forensics, cyber security, security architecture and models, focusing predominantly, on access control systems, secure group communications, secure public key infrastructure (SPKI), and secure physical access control.