This page contains the list of (invited) talks I gave on different occasions.


Talks

  1. Authentication with Privacy for Connected Cars: A research perspective.
    Invited talk. Cyber Security Focus Day @ Connected Cars'16, London, UK, 27.06.2016

  2. Blind Password Registration for Verifier-based PAKE.
    ACM AsiaPKC 2016 @ ACM ASIACCS 2016, Xian, China, 30.05.2016

  3. A Modular Framework for Multi-Factor Authentication and Key Exchange.
    1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014

  4. Secure Modular Password Authentication for the Web using Channel Bindings.
    1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014

  5. Cryptography and Passwords.
    Invited talk. SafeNet Crypto Club, London, UK, 05.12.2014

  6. Cryptographic Password Authentication with TLS Channel Bindings.
    Invited talk. SnT research seminar, University of Luxembourg, 20.11.2014

  7. Zero-Knowledge Policy Checks for Passwords and Verifier-Based PAKE.
    Invited talk. SKECH@BiCi: Secure Key Exchange and Channel Protocols, Bertinoro, Italy, 05.06.2014

  8. Oblivious Password Authentication for the Web.
    Invited talk. Number Theory and Cryptography, Darmstadt, Germany, 22.11.2013

  9. A Framework for Multi-Factor Authentication.
    CryptoForma Network, 9th Meeting, Guildford, UK, 29.11.2012

  10. Relationships among Privacy Notions for Signatures.
    Dagstuhl-Seminar "Privacy-Oriented Cryptography", Dagstuhl, Germany, 20.09.2012

  11. Publicly Verifiable Ciphertexts.
    8th International Conference on Security and Cryptography for Networks (SCN 2012), Amalfi, Italy, 06.09.2012

  12. Forward-Secure Hierarchical Predicate Encryption.
    5th International Conference on Pairing-Based Cryptography (Pairing 2012), Cologne, Germany, 17.05.2012

  13. Pseudorandom Signatures.
    CryptoForma Network, 7th Meeting, Edinburgh, UK, 01.03.2012

  14. Group Signature with Constant Revocation Costs for Signers and Verifiers.
    10th International Conference on Cryptology and Network Security 2011, Sanya, China, 11.12.2011

  15. Non-Interactive and Re-Usable UC String Commitments with Adaptive Security.
    ASIACRYPT 2011, Seoul, Korea, 07.12.2011 [PDF]
    Invited talk. Crypto Seminar, IBM Research T.J. Watson, NY, USA, 01.12.2011

  16. Social Authentication with Privacy.
    Invited talk. Royal Holloway, University of London, UK, 23.06.2011

  17. Privacy-Oriented Cryptography for Social Clouds.
    Invited talk. LACS Seminar, University of Luxembourg, 19.05.2011

  18. Cryptographic Approach to Private Social Clouds.
    Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France, 06.05.2011

  19. Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation.
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Hong Kong, 24.03.2011 [PDF]

  20. Cryptographic Treatment of Private User Profiles.
    15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, St. Lucia, 04.03.2011 [PDF]

  21. Affiliation-Hiding Authentication.
    Invited talk. Royal Holloway, University of London, UK 21.10.2010

  22. Privacy via Group Authentication.
    Invited talk. Goethe University of Frankfurt, Germany 01.09.2010

  23. Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
    8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, 23.06.2010 [PDF]

  24. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
    AFRICACRYPT 2010, Stellenbosch, South Africa, 05.05.2010 [PDF]

  25. Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
    8th IEEE Intl. Conference on Pervasive Computing and Communications, MP2P Workshop, Mannheim, Germany, 02.04.2010 [PDF]

  26. Fully Robust Tree-Diffie-Hellman Group Key Exchange.
    8th International Conference on Cryptology and Network Security, Kanazawa, Ishikawa, Japan, 14.12.2009 [PDF]

  27. Parameterwahl für sichere zeitgemäße Verschlüsselung.
    Invited talk. CAST e.V. Workshop "Datenschutz", Darmstadt, Germany, 29.10.2009 [PDF]

  28. Securing Roaming Access Inside Wireless Mesh Networks.
    10th International Workshop on Information Security Applications, Busan, South Korea, 27.08.2009 [PDF]

  29. Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
    7th International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, France, 02.06.2009 [PDF]

  30. Non-Interactive Computation of Pairwise Keys in Group Diffie-Hellman Protocols.
    Invited talk. Workshop on Cryptographic Protocols and Public-Key Cryptography, BiCi, University Residential Center, Bertinoro (Forlì-Cesena), Italy, 26.05.2009

  31. Authenticated Wireless Roaming via Tunnels.
    Invited talk. GI/HGI Wireless Security 2009, Bochum, Germany, 13.03.2009 [PDF]

  32. The Concept of Wireless Roaming via Tunnels: Authentication and Key Establishment Issues.
    Invited talk. BCRYPT PhD Day, Leuven, Belgium, 13.10.2008

  33. Fully Robust Group Key Exchange in the Presence of Opening Attacks.
    Invited talk. ACAC Seminar, Centre for Advanced Computing - Algorithms and Cryptography, Macquarie University, Sydney, Australia, 11.07.2008

  34. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
    13th Australasian Conference on Information Security and Privacy, Wollongong, Australia, 07.07.2008

  35. Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
    ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 20.03.2008

  36. Securing Group Key Exchange against Strong Corruptions.
    ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 19.03.2008

  37. On Security Models and Compilers for Group Key Exchange Protocols.
    2nd International Workshop on Security, Nara, Japan, 30.10.2007

  38. Provably Secure Framework for Information Aggregation in Sensor Networks.
    7th International Conference on Computational Science and Applications, Kuala Lumpur, Malaysia, 27.08.2007

  39. Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
    4th International Conference on Autonomic and Trusted Computing, Hong Kong, China, 13.07.2007

  40. Browser-based Authentication Protocols for Naive Users.
    Western European Workshop on Research in Cryptology, Bochum, Germany, 06.07.2007

  41. Security-Enhancing Compilers for Group Key Exchange Protocols.
    Invited talk. UCL Crypto Group Seminar, Louvain-la-Neuve, Belgium, 20.06.2007

  42. Strong Corruptions in Group Key Exchange.
    Invited talk. Workshop on Cryptographic Protocols, BiCi, University Residential Center, Bertinoro (Forli-Cesena), Italy 08.03.2007

  43. Kryptographie und Datensicherheit.
    Invited tutorial. Im Rahmen des Weiterbildungsstudiums "IT-Sicherheit- Administration und Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität Bochum, 10.02.2007

  44. A Security Model for Group Key Exchange.
    ECRYPT-PROVILAB Meeting, Horst Görtz Institute for IT Security, Bochum, Germany 05.10.2006

  45. Group Signatures for Federated Systems.
    Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France 02.06.2006

  46. New Paradigms for Group Signatures in Federated Systems.
    4. Kryptotag, Horst Görtz Institute for IT Security, Bochum, Germany 11.05.2006 [PDF]

  47. Property-Based Taming of Lying Mobile Nodes.
    IEEE International Workshop on Trusted and Autonomic Computing Systems, Vienna, Austria, 19.04.2006

  48. Linkable Democratic Group Signatures.
    2nd Information Security Practice and Experience Conference, Hangzhou, China, 13.04.2006

  49. Democratic Group Signatures.
    ACM Symposium on Information, Computer and Communications Security, Taipei, Taiwan, 21.03.2006

  50. Kryptographie und Datensicherheit.
    Invited tutorial. Weiterbildungsstudium "IT-Sicherheit- Administration und Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität Bochum, 17/02/2006

  51. CGKA Protocols, Revisited for Mobile Ad-Hoc Groups.
    International Workshop on Wireless and Sensor Networks Security, Washington, USA, 07.11.2005

  52. Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
    International Workshop on Security in Networks and Distributed Systems, Fukuoka, Japan, 21.07.2005

  53. Binary Trees in Group Communication Security.
    Invited talk. PG seminar "Algebra and Geometry", Chair for Algebra and Geometry, Ruhr University Bochum, Germany, 17.12.2005

  54. Pseudonym Generation Scheme for Ad-Hoc Group Communication.
    European Workshop on Security in Ad-Hoc and Sensor Networks, Heidelberg, Germany, 05.08.2004