This page contains the list of (invited) talks I gave on different occasions.

Talks

  1. Selected Topics in Private Data Processing.
    Invited lectures. Privacy Computing Course @ Graduate Summer School, Shandong University, Virtual/ China, 18.07.2023

  2. Asynchronous Remote Key Generation and its Applications.
    Invited talk. ASSURED Scientific Workshop, TU Darmstadt, Germany, 26.04.2023

  3. Asynchronous Remote Key Generation for Account Recovery and Delegation in WebAuthn.
    Invited talk. Codes and Cryptography Seminar, Paderborn University, Germany, 16.12.2022

  4. On Account Recovery and Delegation in WebAuthn.
    Future of Personal Identification (FoPI) 2021 @ IEEE EuroS&P 2021, Virtual / Vienna, Austria, 06.09.2021

  5. Security Challenges for Satellite Constellations and Communications.
    Invited speaker and panelist. CYSAT 2021, Virtual / Davos, CH, 18.03.2021 [YouTube]

  6. Security in Future Technologies: Core Capabilities and Threats.
    Invited panelist. EIT Digital Tech Networking Event, London, UK, 03.10.2019

  7. Reputation and Privacy in Gig.
    Invited talk. NCSC Annual ACE-CSR Conference, Stratford-upon-Avon, UK, 26.06.2019

  8. Authentication with Privacy for Connected Cars: A research perspective.
    Invited talk. Cyber Security Focus Day @ Connected Cars'16, London, UK, 27.06.2016

  9. Blind Password Registration for Verifier-based PAKE.
    ACM AsiaPKC 2016 @ ACM ASIACCS 2016, Xian, China, 30.05.2016

  10. A Modular Framework for Multi-Factor Authentication and Key Exchange.
    1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014

  11. Secure Modular Password Authentication for the Web using Channel Bindings.
    1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014

  12. Cryptography and Passwords.
    Invited talk. SafeNet Crypto Club, London, UK, 05.12.2014

  13. Cryptographic Password Authentication with TLS Channel Bindings.
    Invited talk. SnT research seminar, University of Luxembourg, 20.11.2014

  14. Zero-Knowledge Policy Checks for Passwords and Verifier-Based PAKE.
    Invited talk. SKECH@BiCi: Secure Key Exchange and Channel Protocols, Bertinoro, Italy, 05.06.2014

  15. Oblivious Password Authentication for the Web.
    Invited talk. Number Theory and Cryptography, Darmstadt, Germany, 22.11.2013

  16. A Framework for Multi-Factor Authentication.
    CryptoForma Network, 9th Meeting, Guildford, UK, 29.11.2012

  17. Relationships among Privacy Notions for Signatures.
    Dagstuhl-Seminar "Privacy-Oriented Cryptography", Dagstuhl, Germany, 20.09.2012

  18. Publicly Verifiable Ciphertexts.
    8th International Conference on Security and Cryptography for Networks (SCN 2012), Amalfi, Italy, 06.09.2012

  19. Forward-Secure Hierarchical Predicate Encryption.
    5th International Conference on Pairing-Based Cryptography (Pairing 2012), Cologne, Germany, 17.05.2012

  20. Pseudorandom Signatures.
    CryptoForma Network, 7th Meeting, Edinburgh, UK, 01.03.2012

  21. Group Signature with Constant Revocation Costs for Signers and Verifiers.
    10th International Conference on Cryptology and Network Security 2011, Sanya, China, 11.12.2011

  22. Non-Interactive and Re-Usable UC String Commitments with Adaptive Security.
    ASIACRYPT 2011, Seoul, Korea, 07.12.2011 [PDF]
    Invited talk. Crypto Seminar, IBM Research T.J. Watson, NY, USA, 01.12.2011

  23. Social Authentication with Privacy.
    Invited talk. Royal Holloway, University of London, UK, 23.06.2011

  24. Privacy-Oriented Cryptography for Social Clouds.
    Invited talk. LACS Seminar, University of Luxembourg, 19.05.2011

  25. Cryptographic Approach to Private Social Clouds.
    Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France, 06.05.2011

  26. Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation.
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Hong Kong, 24.03.2011 [PDF]

  27. Cryptographic Treatment of Private User Profiles.
    15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, St. Lucia, 04.03.2011 [PDF]

  28. Affiliation-Hiding Authentication.
    Invited talk. Royal Holloway, University of London, UK 21.10.2010

  29. Privacy via Group Authentication.
    Invited talk. Goethe University of Frankfurt, Germany 01.09.2010

  30. Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
    8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, 23.06.2010 [PDF]

  31. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
    AFRICACRYPT 2010, Stellenbosch, South Africa, 05.05.2010 [PDF]

  32. Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
    8th IEEE Intl. Conference on Pervasive Computing and Communications, MP2P Workshop, Mannheim, Germany, 02.04.2010 [PDF]

  33. Fully Robust Tree-Diffie-Hellman Group Key Exchange.
    8th International Conference on Cryptology and Network Security, Kanazawa, Ishikawa, Japan, 14.12.2009 [PDF]

  34. Parameterwahl für sichere zeitgemäße Verschlüsselung.
    Invited talk. CAST e.V. Workshop "Datenschutz", Darmstadt, Germany, 29.10.2009 [PDF]

  35. Securing Roaming Access Inside Wireless Mesh Networks.
    10th International Workshop on Information Security Applications, Busan, South Korea, 27.08.2009 [PDF]

  36. Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
    7th International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, France, 02.06.2009 [PDF]

  37. Non-Interactive Computation of Pairwise Keys in Group Diffie-Hellman Protocols.
    Invited talk. Workshop on Cryptographic Protocols and Public-Key Cryptography, BiCi, University Residential Center, Bertinoro (Forlì-Cesena), Italy, 26.05.2009

  38. Authenticated Wireless Roaming via Tunnels.
    Invited talk. GI/HGI Wireless Security 2009, Bochum, Germany, 13.03.2009 [PDF]

  39. The Concept of Wireless Roaming via Tunnels: Authentication and Key Establishment Issues.
    Invited talk. BCRYPT PhD Day, Leuven, Belgium, 13.10.2008

  40. Fully Robust Group Key Exchange in the Presence of Opening Attacks.
    Invited talk. ACAC Seminar, Centre for Advanced Computing - Algorithms and Cryptography, Macquarie University, Sydney, Australia, 11.07.2008

  41. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
    13th Australasian Conference on Information Security and Privacy, Wollongong, Australia, 07.07.2008

  42. Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
    ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 20.03.2008

  43. Securing Group Key Exchange against Strong Corruptions.
    ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 19.03.2008

  44. On Security Models and Compilers for Group Key Exchange Protocols.
    2nd International Workshop on Security, Nara, Japan, 30.10.2007

  45. Provably Secure Framework for Information Aggregation in Sensor Networks.
    7th International Conference on Computational Science and Applications, Kuala Lumpur, Malaysia, 27.08.2007

  46. Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
    4th International Conference on Autonomic and Trusted Computing, Hong Kong, China, 13.07.2007

  47. Browser-based Authentication Protocols for Naive Users.
    Western European Workshop on Research in Cryptology, Bochum, Germany, 06.07.2007

  48. Security-Enhancing Compilers for Group Key Exchange Protocols.
    Invited talk. UCL Crypto Group Seminar, Louvain-la-Neuve, Belgium, 20.06.2007

  49. Strong Corruptions in Group Key Exchange.
    Invited talk. Workshop on Cryptographic Protocols, BiCi, University Residential Center, Bertinoro (Forli-Cesena), Italy 08.03.2007

  50. Kryptographie und Datensicherheit.
    Invited tutorial. Im Rahmen des Weiterbildungsstudiums "IT-Sicherheit- Administration und Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität Bochum, 10.02.2007

  51. A Security Model for Group Key Exchange.
    ECRYPT-PROVILAB Meeting, Horst Görtz Institute for IT Security, Bochum, Germany 05.10.2006

  52. Group Signatures for Federated Systems.
    Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France 02.06.2006

  53. New Paradigms for Group Signatures in Federated Systems.
    4. Kryptotag, Horst Görtz Institute for IT Security, Bochum, Germany 11.05.2006 [PDF]

  54. Property-Based Taming of Lying Mobile Nodes.
    IEEE International Workshop on Trusted and Autonomic Computing Systems, Vienna, Austria, 19.04.2006

  55. Linkable Democratic Group Signatures.
    2nd Information Security Practice and Experience Conference, Hangzhou, China, 13.04.2006

  56. Democratic Group Signatures.
    ACM Symposium on Information, Computer and Communications Security, Taipei, Taiwan, 21.03.2006

  57. Kryptographie und Datensicherheit.
    Invited tutorial. Weiterbildungsstudium "IT-Sicherheit- Administration und Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität Bochum, 17/02/2006

  58. CGKA Protocols, Revisited for Mobile Ad-Hoc Groups.
    International Workshop on Wireless and Sensor Networks Security, Washington, USA, 07.11.2005

  59. Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
    International Workshop on Security in Networks and Distributed Systems, Fukuoka, Japan, 21.07.2005

  60. Binary Trees in Group Communication Security.
    Invited talk. PG seminar "Algebra and Geometry", Chair for Algebra and Geometry, Ruhr University Bochum, Germany, 17.12.2005

  61. Pseudonym Generation Scheme for Ad-Hoc Group Communication.
    European Workshop on Security in Ad-Hoc and Sensor Networks, Heidelberg, Germany, 05.08.2004