- Cryptographic Protocols II - 22nd International Conference on Applied Cryptography and Network Security 2024
- Cryptographic Protocols - 20th International Conference on Applied Cryptography and Network Security 2022
- Applied Cryptography III - 25th European Symposium on Research in Computer Security 2020
- Post-Quantum Cryptography - 17th International Conference on Applied Cryptography and Network Security 2019
- Encryption, Signatures and Fundamentals - 19th Information Security Conference 2016
- Attribute-based Cryptography - 19th European Symposium on Research in Computer Security 2014
- Protocols and Combiners - 8th International Conference on Security and Cryptography for Networks 2012
- Public Key Cryptography - 17th Australasian Conference on Information Security and Privacy 2012
- Beyond Ordinary Signature Schemes - 15th IACR PKC 2012
- Applied Crypto I - 9th International Conference on Applied Cryptography and Network Security 2011
- Applied Cryptography I - 6th ACM Symposium on Information, Computer and Communications Security 2011
- Wireless Network Security - 9th International Conference on Cryptology and Network Security 2010
- Key Management - 8th International Conference on Applied Cryptography and Network Security 2010
- Network Coding - 13th International Conference on Practice and Theory in Public Key Cryptography 2010
- Networks - AFRICACRYPT 2010
- Cryptographic Protocol and Schemes I - 8th International Conference on Cryptology and Network Security 2009
- Hardware Implementation Security - 10th International Workshop on Information Security Applications 2009
- Digital signatures, Hash functions and Protocols - 2nd International Workshop on Security 2007
- Key Management - International Conference on Autonomic and Trusted Computing 2007
- Security Protocols and Policies - International Workshop on Wireless and Sensor Networks Security 2005
- Key Management - International Workshop on Security in Networks and Distributed Systems 2005
- International Conference on Practice and Theory in Public Key Cryptography (PKC) 2025
- EUROCRYPT 2024
- 28th European Symposium on Research in Computer Security (ESORICS 2023)
- 18th ACM Symposium on Information, Computer, and Communications Security (ASIACCS) 2023
- 21st International Conference on Applied Cryptography and Network Security (ACNS) 2023
- 17th ACM Symposium on Information, Computer, and Communications Security (ASIACCS) 2022
- 25th Information Security Conference (ISC) 2022
- 20th International Conference on Applied Cryptography and Network Security (ACNS) 2022
- 20th International Conference on Cryptology and Network Security (CANS) 2021
- 21st Information Security Conference (ISC) 2021
- 19th International Conference on Applied Cryptography and Network Security (ACNS) 2021
- 23rd Information Security Conference (ISC) 2020
- 25th European Symposium on Research in Computer Security (ESORICS 2020)
- 18th International Conference on Applied Cryptography and Network Security (ACNS) 2020
- 18th International Conference on Cryptology and Network Security (CANS) 2019
- 22nd Information Security Conference (ISC) 2019
- Workshop on Privacy Enhancing Cryptography in Ledgers (PENCIL) @ EUROCRYPT 2019
- 24th Australasian Conference on Information Security and Privacy (ACISP) 2019
- 17th International Conference on Applied Cryptography and Network Security (ACNS) 2019
- 23rd European Symposium on Research in Computer Security (ESORICS) 2018
- 23rd Australasian Conference on Information Security and Privacy (ACISP) 2018
- 16th International Conference on Applied Cryptography and Network Security (ACNS) 2018
- 20th Information Security Conference (ISC) 2017
- 11th International Conference on Provable Security (ProvSec) 2017
- 6th International Conference on Principles of Security and Trust (POST) 2017
- 15th International Conference on Applied Cryptography and Network Security (ACNS) 2017
- 4th ACM ASIA Public-Key Cryptography Workshop (AsiaPKC) 2017
- 19th Information Security Conference (ISC) 2016
- 10th International Conference on Provable Security (ProvSec) 2016
- 3rd ACM ASIA Public-Key Cryptography Workshop (AsiaPKC) 2016
- AFRICACRYPT 2016
- 15th IMA Conference on Cryptography and Coding 2015
- 6th Western European Workshop on Research in Cryptology (WEWoRC) 2015
- 9th International Conference on Provable Security (ProvSec) 2015
- 20th Australasian Conference on Information Security and Privacy (ACISP) 2015
- 10th ACM Symposium on Information, Computer, and Communications Security (ASIACCS) 2015
- 18th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2015
- 19th International Conference on Financial Cryptography and Data Security (FC) 2015
- 8th International Conference on Provable Security (ProvSec) 2014
- 19th European Symposium on Research in Computer Security (ESORICS) 2014
- 10th Workshop on RFID Security (RFIDsec) 2014
- AFRICACRYPT 2014
- 18th International Conference on Financial Cryptography and Data Security (FC) 2014
- 17th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2014
- 9th International Conference on Security and Privacy in Communication Networks (SecureComm) 2013
- 15th International Conference on Information and Communications Security (ICICS) 2013
- 11th International Conference on Applied Cryptography and Network Security (ACNS) 2013
- 17th International Conference on Financial Cryptography and Data Security (FC) 2013
- The Cryptographers' Track at the RSA Conference (CT-RSA) 2013
- 15th International Conference on Information Security and Cryptology (ICISC) 2012
- 8th China International Conference on Information Security and Cryptology (Inscrypt) 2012
- 15th Information Security Conference (ISC) 2012
- 9th IEEE International Conference on Mobile Ad hoc and Sensor Systems (IEEE MASS) 2012
- 14th International Conference on Information and Communications Security (ICICS) 2012
- 8th International Conference on Security and Privacy in Communication Networks (SecureComm) 2012
- 6th International Conference on Provable Security (ProvSec) 2012
- 10th International Conference on Applied Cryptography and Network Security (ACNS) 2012
- IFIP International Workshop on Information Security Theory and Practice (WISTP) 2012
- IEEE International Workshop on Security and Social Networking (SeSoc) 2012
- 14th International Conference on Information Security and Cryptology (ICISC) 2011
- 13th International Conference on Information and Communications Security (ICICS) 2011
- 10th International Conference on Cryptology and Network Security (CANS) 2011
- 14th Information Security Conference (ISC) 2011
- 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS) 2011
- 16th Australasian Conference on Information Security and Privacy (ACISP) 2011
- 9th International Conference on Applied Cryptography and Network Security (ACNS) 2011
- International Workshop on Social Computing, Network, and Services (SocialComNet) 2011
- AFRICACRYPT 2011
- IFIP International Workshop on Information Security Theory and Practice (WISTP) 2011
- 4th ACM Conference on Wireless Network Security (ACM WiSec) 2011
- IEEE International Workshop on Security and Social Networking (SeSoc) 2011
- 6th ACM Symposium on Information, Computer, and Communications Security (ASIACCS) 2011
- 13th International Conference on Information Security and Cryptology (ICISC) 2010
- 9th International Conference on Cryptology and Network Security (CANS) 2010
- 13th Information Security Conference (ISC) 2010
- 11th International Workshop on Information Security Applications (WISA) 2010
- 4th International Conference on Pairing-based Cryptography (Pairing) 2010
- SICHERHEIT 2010
- 15th Australasian Conference on Information Security and Privacy (ACISP) 2010
- 8th International Conference on Applied Cryptography and Network Security (ACNS) 2010
- 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010
- IEEE International Workshop on Security and Social Networking (SeSoc) 2010
- 4th Benelux Workshop on Information and System Security (WISSec) 2009
- 12th International Conference on Information Security and Cryptology (ICISC) 2009
- International Conference on Knowledge Management and Information Sharing (KMIS) 2009
- 8th International Conference on Cryptology and Network Security (CANS) 2009
- 4th International Workshop on Security (IWSEC) 2009
- 3rd Workshop on Security and High Performance Computing Systems (SHPCS) 2009
- 14th Australasian Conference on Information Security and Privacy (ACISP) 2009
- International Workshop on Computer Graphics, Multimedia, and Security (CGMS) 2009
- 4th International Symposium on Ubiquitous Applications & Security Service (UASS) 2009
- 9th International Workshop on Information Security Applications (WISA) 2008
- 3rd International Workshop on Security (IWSEC) 2008
- 2nd Workshop on Security and High Performance Computing Systems (SHPCS) 2008
- 3rd International Workshop on Ubiquitous Applications & Security Service (UASS) 2008
- 10th International Conference on Information Security and Cryptology (ICISC) 2007
- 2nd International Workshop on Ubiquitous Applications & Security Service (UASS) 2007
- 2nd International Workshop on Security (IWSEC) 2007
- 4th International Conference on Autonomic and Trusted Computing (ATC) 2007
- 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS) 2007
- 3rd International Conference on Autonomic and Trusted Computing (ATC) 2006
- 2nd International Workshop on Security in Networks and Distributed Systems (SNDS) 2006
More committee work
Reviewer for journals
- ©ACM: ACM Transactions on Information and System Security (TISSEC), Communications of the ACM (CACM)
- ©Springer: Journal of Cryptology, International Journal of Information Security, Designs, Codes, and Cryptography, Peer-to-Peer Networking and Applications
- ©IEEE: IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Theory, IEEE Transactions on Information Forensics & Security, IEEE Transactions on Wireless Communications,
IEEE Transactions on Speech and Audio Processing
- ©Elsevier: Ad Hoc Networks, Computers & Security, Computer Communications, Computer Networks,
Computer Standards & Interfaces, Journal of Information Security and Applications, Future Generation Computer Systems, Information Processing Letters,
Information Sciences, Pervasive and Mobile Computing
- ©IOS: Journal of Computer Security
- ©Inderscience: International Journal of Applied Cryptography
- ©Wiley: International Journal of Communication Systems
I also participated as external reviewer to numerous conferences and workshops.