02.12.2020 |
A talk based on our work with Yubico has been accepted to Real World Crypto 2021. |
22.11.2020 |
"Password-Authenticated Searchable Encryption" published in International Journal of Information Security. |
16.11.2020 |
Yubico's blog article explains our joint work on the new protocol for WebAuthn credentials backup. |
01.09.2020 |
I am now Head of Department of Computer Science at the University of Surrey. |
26.08.2020 |
I joined the Editorial Board of IEEE Transactions on Information Forensics and Security" (IEEE TIFS), IF 6.2 |
11.08.2020 |
"An Interoperable Architecture for Usable Password-less Authentication" accepted at ETAA@ESORICS2020 |
03.08.2020 |
"Asynchronous Remote Key Generation: An analysis of Yubico’s proposal for W3C WebAuthn" accepted at ACM CCS 2020 |
14.05.2020 |
"Cyber Security in New Space" appeared in International Journal of Information Security (Open Access) |
13.05.2020 |
"TAPESTRY: A De-centralized Service for Trusted Interaction Online" appeared in IEEE Trans. on Services Computing |
13.05.2020 |
I am co-chairing DETIPS 2020 workshop affiliated with ESORICS 2020. |
13.05.2020 |
I'll be serving on the PCs of ACNS 2020, ESORICS 2020, and ISC 2020. |
Archive |
|
26.12.2019 |
"KYChain: User-Controlled KYC Data Sharing and Certification" accepted at ACM SAC 2020 |
|
23.12.2019 |
I am chairing ESORICS 2020 Workshops. Call for Workshops is open! |
|
11.11.2019 |
"Biometric-Authenticated Searchable Encryption" accepted at ACNS 2020. |
24.06.2019 |
"Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics" accepted at ESORICS 2019. |
13.04.2019 |
"pRate: Anonymous Star Rating with Rating Secrecy" accepted at ACNS 2019. |
13.04.2019 |
"Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length" accepted at ACNS 2019. |
13.04.2019 |
"Bootstrapping Online Trust: Timeline Activity Proofs over Public Ledgers" accepted at PENCIL@EUROCRYPT 2019. |
05.02.2019 |
I'll be serving on the PCs of ACNS 2019, ACISP 2019, PENCIL,
ISC 2019, and CANS 2019. |
23.10.2018 |
I have been invited to join the Editorial Board of Springer's International Journal of Information Security. |
25.07.2018 |
"Hierarchical Attribute-based Signatures" accepted at CANS 2018.
|
25.07.2018 |
"Bootstrapping Online Trust: Timeline Activity Proofs" accepted at DPM 2018 (co-located with ESORICS).
|
04.12.2017 |
I will be co-charing ISC 2018.
|
12.06.2017 |
"Password Authenticated Keyword Search" accepted at IEEE PAC 2017.
|
08.06.2017 |
Two new research projects have started: TAPESTRY (funded by EPSRC) and ABS4Cars (funded by NCSC).
|
21.09.2016 |
"Secure Modular Password Authentication for the Web using Channel Bindings" accepted by Springer's IJIS journal. |
09.09.2016 |
Best Paper Award at ISC 2016 for our paper with Franziskus Kiefer from Mozilla. |
27.06.2016 |
I gave invited talk on "Authentication with Privacy for Connected Cars" @ Connected Cars'16. |
19.06.2016 |
ACNS 2016 proceedings appeared in Springer's LNCS 9696. |
16.05.2016 |
"Universally Composable Two-Server PAKE" accepted at ISC 2016. |
16.05.2016 |
"Blind Password Registration for Two-Server Password Authenticated Key Exchange ..." accepted at ISC 2016. |
09.03.2016 |
"Blind Password Registration for Verifier-based PAKE" accepted at ACM ASIAPKC 2016. |
13.01.2016 |
I'll be serving on the PC of ISC 2016. |
10.12.2015 |
"Public Key Encryption with Distributed Keyword Search" accepted at InTrust 2015. |
21.06.2015 |
"Oblivious PAKE: Efficient Handling of Password Trials" accepted at ISC 2015. |
25.03.2015 |
SCCS becomes an Academic Centre of Excellence for Cyber Security Research. |
17.03.2015 |
I'll be serving on the PCs of IMA Cryptography and Coding 2015 and WEWoRC 2015. |
10.02.2015 |
I joined the Editoral Board of IET Information Security. |
27.01.2015 |
I'll be serving on the PCs of ACISP 2015 and ProvSec 2015. |
17.12.2014 |
Best Paper Award for "Rerandomizable Threshold Blind Signatures" at InTrust 2014. |
05.09.2014 |
"Secure Modular Password Authentication for the Web using Channel Bindings" accepted at SSR 2014. |
05.09.2014 |
"A Modular Framework for Multi-Factor Authentication and Key Exchange" accepted at SSR 2014. |
01.08.2014 |
Our MSc Information Security degree receives GCHQ certification.
Related media links: a|
b|
c|
d|
e
|
01.08.2014 |
"Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Ag..." accepted at CANS 2014. |
01.07.2014 |
Our Surrey Centre for Cyber Security (SCCS) was officially launched today. |
25.06.2014 |
"Zero-Knowledge Password Policy Checks and Verifier-Based PAKE" accepted at ESORICS 2014. |
05.06.2014 |
Our department has an open tenure position in security. Application deadline: 30.06.2014. |
15.04.2014 |
My comments for BBC News on the Heartbleed security bug in SSL. |
16.03.2014 |
"Distributed Smooth Projective Hashing and its Application to Two-Server Pass..." accepted at ACNS 2014. |
12.03.2014 |
My comments for Turkish Press on phone tapping in the UK. |
18.02.2014 |
My comments for BBC News on the European data network proposal. |
13.02.2014 |
University of Surrey launches a new "MSc Information Security". |
03.12.2013 |
I'll be serving on the PC of ESORICS 2014. |
19.11.2013 |
My comments for BBC News on the Yahoo's announcement to deploy encryption. |
03.11.2013 |
"Plaintext Awareness in Identity-Based Key Encapsulation" accepted at Int. J. of Information Security. |
26.10.2013 |
An interview with me on BBC News on the role of encryption in the modern world. |
14.10.2013 |
"Formalising Human Recognition: a Fundamental Building Block ..." accepted at ACSW-AISC 2014. |
23.09.2013 |
"Publicly Verifiable Ciphertexts" accepted at Journal of Computer Security. |
02.09.2013 |
"Unique Aggregate Signatures with Applications to Distributed Verifiable ..." accepted at CANS 2013. |
15.04.2013 |
"Relations among Privacy Notions for Signcryption and Key Invisible ..." accepted at ACISP 2013. |
13.03.2013 |
I'll be serving on the PC of PKC 2014. |
10.03.2013 |
Edited issue on "Security and Privacy for Digital Ecosystems" appeared in the ISTR journal. |
26.02.2013 |
Journal article "Forward-Secure Hierarchical Predicate Encryption" accepted by The Computer Journal. |
25.01.2013 |
"Pseudorandom Signatures" accepted at ACM ASIACCS 2013. |
16.12.2012 |
Journal article "Private Discovery of Common Social Contacts" published in IJIS. |
10.12.2012 |
I'll be serving on the PC of ACNS 2013. |
17.06.2012 |
"Publicly Verifiable Ciphertexts" accepted at SCN 2012. |
12.06.2012 |
Submission server of CANS 2012 is online. Submission date is 02.07.2012. |
28.05.2012 |
I'll be serving on the PC of FC 2013. |
13.05.2012 |
"Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-..." accepted at ARES 2012 |
03.05.2012 |
I'll be serving on the PC of CT-RSA 2013. |
19.04.2012 |
CANS 2012 website and CfP are online. Submission date is 02.07.2012. |
13.04.2012 |
"Fully Private Revocable Predicate Encryption" accepted at ACISP 2012 |
13.04.2012 |
"Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Ex..." accepted at ACISP 2012 |
03.04.2012 |
"Forward-Secure Hierarchical Predicate Encryption" accepted at Pairing 2012 |
28.03.2012 |
I'll be serving on PCs of SecureComm 2012, ICICS 2012, and ISC 2012, and IEEE MASS 2012 |
07.03.2012 |
PKC 2012 early registration is open and preliminary conference program has been announced. |
08.02.2012 |
I joined the editorial board of Elsevier's Information Security Technical Report. |
24.01.2012 |
I joined the editorial board of Elsevier's Computer Communications. |
05.10.2011 |
I am invited to join the program committee of ProvSec 2012 |
11.09.2011 |
"Group Signature with Constant Revocations Costs for Signers and Verifiers" accepted at CANS 2011 |
30.08.2011 |
I am invited to join the program committee of ACNS 2012 |
22.08.2011 |
"Non-Interactive and Re-Usable Universally Composable String Comm..." accepted at ASIACRYPT 2011 |
27.07.2011 |
IACR PKC 2012 website is online. Submission date is 15.12.2011. |
05.06.2011 |
"Best Student Paper" award for Bertram Poettering and our paper at IFIP WISTP 2011 |
20.05.2011 |
"UPBA: User-Authenticated Property-Based Attestation" accepted for PST 2011 |
19.05.2011 |
I am invited to join the program committee of ICISC 2011 |
17.04.2011 |
I am invited to join the program committee of ICICS 2011 |
07.04.2011 |
"Key Management in Distributed Online Social Networks" invited to IEEE WoWMoM 2011/D-SPAN |
29.03.2011 |
DAAD approved funding for my project proposal "UMA" with Queensland University of Technology |
28.03.2011 |
"Private Discovery of Common Social Contacts" accepted for ACNS 2011 |
02.03.2011 |
Our proposal for a 5 day Dagstuhl-Seminar on Privacy-Oriented Cryptography got accepted. |
25.02.2011 |
DFG (German Research Foundation) approved funding for my project proposal "PRIMAKE" |
20.02.2011 |
I am invited to join the program committee of CANS 2011 |
06.02.2011 |
"Affiliation-Hiding Authentication with Minimal Bandwidth Consumption" accepted for IFIP WISTP 2011 |
23.01.2011 |
Journal article "SWISH: Secure WiFi Sharing" accepted for publication in Computer Networks |
13.01.2011 |
I am invited to join the program committee of ISC 2011 |
12.01.2011 |
Check the new manuscript "Private Discovery of Common Social Contacts". Comments welcome! |
16.12.2010 |
My bid wins in an open call for tender by BSI to conduct a study on privacy-preserving authentication. |
09.12.2010 |
CANS Steering Committee appoints me to serve as General Chair of CANS 2012 (to be held in Germany). |
08.12.2010 |
"Practical Affiliation-Hiding Authentication from Improved Polynom..." accepted for ACM ASIACCS 2011 |
08.12.2010 |
"Cryptographic Treatment of Private User Profiles" accepted for FC 2011/RLCPS |
11.11.2010 |
E-Teaching Award of Carlo and Karin Giersch-Stiftung for my lecture "Introduction to Cryptography" |
10.09.2010 |
BMBF approved funding for my project proposal "POC" with QUT, Australia |
08.09.2010 |
I am invited to join the program committee of ACNS 2011 |
22.08.2010 |
DAAD approved funding for my project proposal "PACU" with Royal Holloway, University of London. |
01.08.2010 |
I am invited to join the program committee of ACM WiSec 2011 |
02.07.2010 |
I am invited to join the program committees of AFRICACRYPT 2011 and ASIACCS 2011 |
11.05.2010 |
I am invited to join the program committee of CANS 2010 |
21.04.2010 |
"Taming Big Brother Ambitions: More Privacy for Secret Handshakes" accepted for PETS 2010 |
21.04.2010 |
"Privacy-Preserving Group Discovery with Linear Complexity" accepted for ACNS 2010 |
21.04.2010 |
"Affiliation-Hiding Key Exchange with Untrusted Group Authorities" accepted for ACNS 2010 |
21.04.2010 |
"Redactable Signatures for Tree-Structured Data: Definitions and Constructions" accepted for ACNS 2010 |
02.04.2010 |
Check the upcoming PhD Summer School on Applied Cryptographic
Protocols 2010 |
21.02.2010 |
"Flexible Group Key Exchange with On-Demand Computation ..." accepted for AFRICACRYPT 2010 |
21.02.2010 |
"Public-Key Encryption with Non-interactive Opening: New ..." accepted for AFRICACRYPT 2010 |
21.02.2010 |
I am invited to join the program committees of ICISC 2010 and WISA 2010 |
06.02.2010 |
"Confidential Signatures and Deterministic Signcryption" accepted for PKC 2010 |
20.01.2010 |
I am invited to join the program committee of ISC 2010 |
15.01.2010 |
I am invited to join the program committee of Pairing 2010 |
22.12.2009 |
"Privacy-Preserving Admission to Mobile Peer-to-Peer Groups" accepted for PerCom 2010/MP2P |
02.12.2009 |
I am invited to join the program committee of ACISP 2010 |
20.10.2009 |
"Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange" accepted for ICISC 2009 |
20.10.2009 |
"Generic One Round Group Key Exchange in the Standard Model" accepted for ICISC 2009 |
16.10.2009 |
Vortrag zur "Parameterwahl für sichere zeitgemäße Verschlüsselung" im Datenschutz Workshop am 29.10 |
30.09.2009 |
"Enhanced Wireless Roaming Security Using Three-Party Auth..." accepted for CoNEXT 2009/U-Net |
28.08.2009 |
Best patent award at Erfinderwettbewerb 2008 with S. Gajek, T. Jager, and J. Schwenk from RUB |
16.08.2009 |
"Fully Robust Tree-Diffie-Hellman Group Key Exchange" accepted for CANS 2009 |
06.08.2009 |
I am invited to join the program committees of PKC 2010 and WISSec 2009 |
02.08.2009 |
"Securing Remote Access Inside Wireless Mesh Networks" accepted for WISA 2009 |
27.07.2009 |
I am invited to join the program committee of SeSoc 2010 |
07.07.2009 |
"Transparent Mobile Storage Protection in Trusted Virtual Domains" accepted for USENIX LISA 2009 |
22.06.2009 |
I am invited to join the program committee of ACNS 2010 |
19.05.2009 |
Talk on "Non-Interactive Computation of Pairwise Keys in Group Diffie-Hellman Protocols" at WPK 2009 |
03.04.2009 |
"Security Model and Framework for Information Aggregation in Sensor Networks" published at ACM TOSN |
09.03.2009 |
"Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys" accepted for ACNS 2009 |
01.03.2009 |
I am invited to join the program committee of ICISC 2009 |
05.02.2009 |
Vortrag zu "Authenticated Wireless Roaming via Tunnels" in GI/HGI Wireless Security 2009 am 13.03 |