As an active member of the research community I conduct scientific services. This page contains a brief record of my involvement in the organisation of events, conference chairing, memberships in program committees, editorial boards and associations, and diverse reviewing activities for journals and funding agencies.

Organised Events

Conference Chair

Journal Editorial Boards

Session Chair

  • Cryptographic Protocols II - 22nd International Conference on Applied Cryptography and Network Security 2024
  • Cryptographic Protocols - 20th International Conference on Applied Cryptography and Network Security 2022
  • Applied Cryptography III - 25th European Symposium on Research in Computer Security 2020
  • Post-Quantum Cryptography - 17th International Conference on Applied Cryptography and Network Security 2019
  • Encryption, Signatures and Fundamentals - 19th Information Security Conference 2016
  • Attribute-based Cryptography - 19th European Symposium on Research in Computer Security 2014
  • Protocols and Combiners - 8th International Conference on Security and Cryptography for Networks 2012
  • Public Key Cryptography - 17th Australasian Conference on Information Security and Privacy 2012
  • Beyond Ordinary Signature Schemes - 15th IACR PKC 2012
  • Applied Crypto I - 9th International Conference on Applied Cryptography and Network Security 2011
  • Applied Cryptography I - 6th ACM Symposium on Information, Computer and Communications Security 2011
  • Wireless Network Security - 9th International Conference on Cryptology and Network Security 2010
  • Key Management - 8th International Conference on Applied Cryptography and Network Security 2010
  • Network Coding - 13th International Conference on Practice and Theory in Public Key Cryptography 2010
  • Networks - AFRICACRYPT 2010
  • Cryptographic Protocol and Schemes I - 8th International Conference on Cryptology and Network Security 2009
  • Hardware Implementation Security - 10th International Workshop on Information Security Applications 2009
  • Digital signatures, Hash functions and Protocols - 2nd International Workshop on Security 2007
  • Key Management - International Conference on Autonomic and Trusted Computing 2007
  • Security Protocols and Policies - International Workshop on Wireless and Sensor Networks Security 2005
  • Key Management - International Workshop on Security in Networks and Distributed Systems 2005

Program Committees

  • International Conference on Practice and Theory in Public Key Cryptography (PKC) 2025
  • EUROCRYPT 2024
  • 28th European Symposium on Research in Computer Security (ESORICS 2023)
  • 18th ACM Symposium on Information, Computer, and Communications Security (ASIACCS) 2023
  • 21st International Conference on Applied Cryptography and Network Security (ACNS) 2023
  • 17th ACM Symposium on Information, Computer, and Communications Security (ASIACCS) 2022
  • 25th Information Security Conference (ISC) 2022
  • 20th International Conference on Applied Cryptography and Network Security (ACNS) 2022
  • 20th International Conference on Cryptology and Network Security (CANS) 2021
  • 21st Information Security Conference (ISC) 2021
  • 19th International Conference on Applied Cryptography and Network Security (ACNS) 2021
  • 23rd Information Security Conference (ISC) 2020
  • 25th European Symposium on Research in Computer Security (ESORICS 2020)
  • 18th International Conference on Applied Cryptography and Network Security (ACNS) 2020
  • 18th International Conference on Cryptology and Network Security (CANS) 2019
  • 22nd Information Security Conference (ISC) 2019
  • Workshop on Privacy Enhancing Cryptography in Ledgers (PENCIL) @ EUROCRYPT 2019
  • 24th Australasian Conference on Information Security and Privacy (ACISP) 2019
  • 17th International Conference on Applied Cryptography and Network Security (ACNS) 2019
  • 23rd European Symposium on Research in Computer Security (ESORICS) 2018
  • 23rd Australasian Conference on Information Security and Privacy (ACISP) 2018
  • 16th International Conference on Applied Cryptography and Network Security (ACNS) 2018
  • 20th Information Security Conference (ISC) 2017
  • 11th International Conference on Provable Security (ProvSec) 2017
  • 6th International Conference on Principles of Security and Trust (POST) 2017
  • 15th International Conference on Applied Cryptography and Network Security (ACNS) 2017
  • 4th ACM ASIA Public-Key Cryptography Workshop (AsiaPKC) 2017
  • 19th Information Security Conference (ISC) 2016
  • 10th International Conference on Provable Security (ProvSec) 2016
  • 3rd ACM ASIA Public-Key Cryptography Workshop (AsiaPKC) 2016
  • AFRICACRYPT 2016
  • 15th IMA Conference on Cryptography and Coding 2015
  • 6th Western European Workshop on Research in Cryptology (WEWoRC) 2015
  • 9th International Conference on Provable Security (ProvSec) 2015
  • 20th Australasian Conference on Information Security and Privacy (ACISP) 2015
  • 10th ACM Symposium on Information, Computer, and Communications Security (ASIACCS) 2015
  • 18th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2015
  • 19th International Conference on Financial Cryptography and Data Security (FC) 2015
  • 8th International Conference on Provable Security (ProvSec) 2014
  • 19th European Symposium on Research in Computer Security (ESORICS) 2014
  • 10th Workshop on RFID Security (RFIDsec) 2014
  • AFRICACRYPT 2014
  • 18th International Conference on Financial Cryptography and Data Security (FC) 2014
  • 17th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2014
  • 9th International Conference on Security and Privacy in Communication Networks (SecureComm) 2013
  • 15th International Conference on Information and Communications Security (ICICS) 2013
  • 11th International Conference on Applied Cryptography and Network Security (ACNS) 2013
  • 17th International Conference on Financial Cryptography and Data Security (FC) 2013
  • The Cryptographers' Track at the RSA Conference (CT-RSA) 2013
  • 15th International Conference on Information Security and Cryptology (ICISC) 2012
  • 8th China International Conference on Information Security and Cryptology (Inscrypt) 2012
  • 15th Information Security Conference (ISC) 2012
  • 9th IEEE International Conference on Mobile Ad hoc and Sensor Systems (IEEE MASS) 2012
  • 14th International Conference on Information and Communications Security (ICICS) 2012
  • 8th International Conference on Security and Privacy in Communication Networks (SecureComm) 2012
  • 6th International Conference on Provable Security (ProvSec) 2012
  • 10th International Conference on Applied Cryptography and Network Security (ACNS) 2012
  • IFIP International Workshop on Information Security Theory and Practice (WISTP) 2012
  • IEEE International Workshop on Security and Social Networking (SeSoc) 2012
  • 14th International Conference on Information Security and Cryptology (ICISC) 2011
  • 13th International Conference on Information and Communications Security (ICICS) 2011
  • 10th International Conference on Cryptology and Network Security (CANS) 2011
  • 14th Information Security Conference (ISC) 2011
  • 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS) 2011
  • 16th Australasian Conference on Information Security and Privacy (ACISP) 2011
  • 9th International Conference on Applied Cryptography and Network Security (ACNS) 2011
  • International Workshop on Social Computing, Network, and Services (SocialComNet) 2011
  • AFRICACRYPT 2011
  • IFIP International Workshop on Information Security Theory and Practice (WISTP) 2011
  • 4th ACM Conference on Wireless Network Security (ACM WiSec) 2011
  • IEEE International Workshop on Security and Social Networking (SeSoc) 2011
  • 6th ACM Symposium on Information, Computer, and Communications Security (ASIACCS) 2011
  • 13th International Conference on Information Security and Cryptology (ICISC) 2010
  • 9th International Conference on Cryptology and Network Security (CANS) 2010
  • 13th Information Security Conference (ISC) 2010
  • 11th International Workshop on Information Security Applications (WISA) 2010
  • 4th International Conference on Pairing-based Cryptography (Pairing) 2010
  • SICHERHEIT 2010
  • 15th Australasian Conference on Information Security and Privacy (ACISP) 2010
  • 8th International Conference on Applied Cryptography and Network Security (ACNS) 2010
  • 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010
  • IEEE International Workshop on Security and Social Networking (SeSoc) 2010
  • 4th Benelux Workshop on Information and System Security (WISSec) 2009
  • 12th International Conference on Information Security and Cryptology (ICISC) 2009
  • International Conference on Knowledge Management and Information Sharing (KMIS) 2009
  • 8th International Conference on Cryptology and Network Security (CANS) 2009
  • 4th International Workshop on Security (IWSEC) 2009
  • 3rd Workshop on Security and High Performance Computing Systems (SHPCS) 2009
  • 14th Australasian Conference on Information Security and Privacy (ACISP) 2009
  • International Workshop on Computer Graphics, Multimedia, and Security (CGMS) 2009
  • 4th International Symposium on Ubiquitous Applications & Security Service (UASS) 2009
  • 9th International Workshop on Information Security Applications (WISA) 2008
  • 3rd International Workshop on Security (IWSEC) 2008
  • 2nd Workshop on Security and High Performance Computing Systems (SHPCS) 2008
  • 3rd International Workshop on Ubiquitous Applications & Security Service (UASS) 2008
  • 10th International Conference on Information Security and Cryptology (ICISC) 2007
  • 2nd International Workshop on Ubiquitous Applications & Security Service (UASS) 2007
  • 2nd International Workshop on Security (IWSEC) 2007
  • 4th International Conference on Autonomic and Trusted Computing (ATC) 2007
  • 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS) 2007
  • 3rd International Conference on Autonomic and Trusted Computing (ATC) 2006
  • 2nd International Workshop on Security in Networks and Distributed Systems (SNDS) 2006

Selected Further Activities

More committee work
Reviewer for journals
  • ©ACM: ACM Transactions on Information and System Security (TISSEC), Communications of the ACM (CACM)
  • ©Springer: Journal of Cryptology, International Journal of Information Security, Designs, Codes, and Cryptography, Peer-to-Peer Networking and Applications
  • ©IEEE: IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Theory, IEEE Transactions on Information Forensics & Security, IEEE Transactions on Wireless Communications, IEEE Transactions on Speech and Audio Processing
  • ©Elsevier: Ad Hoc Networks, Computers & Security, Computer Communications, Computer Networks, Computer Standards & Interfaces, Journal of Information Security and Applications, Future Generation Computer Systems, Information Processing Letters, Information Sciences, Pervasive and Mobile Computing
  • ©IOS: Journal of Computer Security
  • ©Inderscience: International Journal of Applied Cryptography
  • ©Wiley: International Journal of Communication Systems

I also participated as external reviewer to numerous conferences and workshops.